Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version contain a vulnerability that could allow remote attacker to execute arbitrary code by modifying the value of registry path. This can be leveraged for code execution by rebooting the victim’s PC
References
| Link | Resource |
|---|---|
| http://support.tobesoft.co.kr/Support/index.html | Third Party Advisory |
| https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35491 | Third Party Advisory |
| http://support.tobesoft.co.kr/Support/index.html | Third Party Advisory |
| https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35491 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 05:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://support.tobesoft.co.kr/Support/index.html - Third Party Advisory | |
| References | () https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35491 - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.8 |
Information
Published : 2020-07-02 13:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7821
Mitre link : CVE-2020-7821
CVE.ORG link : CVE-2020-7821
JSON object : View
Products Affected
microsoft
- windows
nexaweb
- nexacro_14
- nexacro_17
CWE
CWE-20
Improper Input Validation
