CVE-2024-3460 (GCVE-0-2024-3460)

Vulnerability from cvelistv5 – Published: 2024-05-09 10:13 – Updated: 2024-08-01 20:12
VLAI?
Summary
In KioWare for Windows (versions all through 8.34) it is possible to exit this software and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs.  In order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know the PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.
CWE
  • CWE-424 - Improper Protection of Alternate Path
Assigner
Impacted products
Vendor Product Version
Kioware Kioware Affected: 0 , ≤ 8.34 (semver)
Create a notification for this product.
Credits
Maksymilian Kubiak [Afine Team]
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "kioware",
            "vendor": "kioware",
            "versions": [
              {
                "lessThanOrEqual": "8.34",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-3460",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-25T18:34:33.771027Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-25T18:35:51.313Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:12:06.924Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://cert.pl/posts/2024/04/CVE-2024-3459"
          },
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459"
          },
          {
            "tags": [
              "product",
              "x_transferred"
            ],
            "url": "https://www.kioware.com/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Kioware",
          "vendor": "Kioware",
          "versions": [
            {
              "lessThanOrEqual": "8.34",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Maksymilian Kubiak [Afine Team]"
        }
      ],
      "datePublic": "2024-05-09T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn KioWare for Windows (versions all \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ethrough 8.34)\u003c/span\u003e\u0026nbsp;it is possible to exit this software\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eand use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs.\u0026nbsp;\u003cbr\u003eIn order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know\u0026nbsp;\u003c/span\u003ethe PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.\u003c/span\u003e\u003cbr\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "In KioWare for Windows (versions all through 8.34)\u00a0it is possible to exit this software\u00a0and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs.\u00a0\nIn order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know\u00a0the PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-424",
              "description": "CWE-424 Improper Protection of Alternate Path",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-09T10:14:30.190Z",
        "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
        "shortName": "CERT-PL"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://cert.pl/posts/2024/04/CVE-2024-3459"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.kioware.com/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
    "assignerShortName": "CERT-PL",
    "cveId": "CVE-2024-3460",
    "datePublished": "2024-05-09T10:13:37.634Z",
    "dateReserved": "2024-04-08T10:30:35.750Z",
    "dateUpdated": "2024-08-01T20:12:06.924Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In KioWare for Windows (versions all through 8.34)\\u00a0it is possible to exit this software\\u00a0and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs.\\u00a0\\nIn order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know\\u00a0the PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"En KioWare para Windows (versiones hasta 8.34) es posible salir de este software y utilizar otras aplicaciones ya abiertas utilizando un breve per\\u00edodo de tiempo antes de que se produzca el cierre de sesi\\u00f3n autom\\u00e1tico forzado. Luego, utilizando alguna funci\\u00f3n integrada de estas aplicaciones, se pueden iniciar otros programas. Para aprovechar esta vulnerabilidad, las aplicaciones externas deben dejarse en ejecuci\\u00f3n cuando se inicia el software KioWare. Adem\\u00e1s, un atacante debe conocer el PIN establecido para esta instancia de Kioware y tambi\\u00e9n ralentizar la aplicaci\\u00f3n con alguna tarea espec\\u00edfica que extienda la ventana de tiempo utilizable.\"}]",
      "id": "CVE-2024-3460",
      "lastModified": "2024-11-21T09:29:38.773",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"cvd@cert.pl\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.4, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.4, \"impactScore\": 5.9}]}",
      "published": "2024-05-14T15:41:12.850",
      "references": "[{\"url\": \"https://cert.pl/en/posts/2024/04/CVE-2024-3459\", \"source\": \"cvd@cert.pl\"}, {\"url\": \"https://cert.pl/posts/2024/04/CVE-2024-3459\", \"source\": \"cvd@cert.pl\"}, {\"url\": \"https://www.kioware.com/\", \"source\": \"cvd@cert.pl\"}, {\"url\": \"https://cert.pl/en/posts/2024/04/CVE-2024-3459\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://cert.pl/posts/2024/04/CVE-2024-3459\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.kioware.com/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cvd@cert.pl",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"cvd@cert.pl\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-424\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-3460\",\"sourceIdentifier\":\"cvd@cert.pl\",\"published\":\"2024-05-14T15:41:12.850\",\"lastModified\":\"2025-02-12T15:36:15.813\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In KioWare for Windows (versions all through 8.34)\u00a0it is possible to exit this software\u00a0and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs.\u00a0\\nIn order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know\u00a0the PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.\\n\\n\"},{\"lang\":\"es\",\"value\":\"En KioWare para Windows (versiones hasta 8.34) es posible salir de este software y utilizar otras aplicaciones ya abiertas utilizando un breve per\u00edodo de tiempo antes de que se produzca el cierre de sesi\u00f3n autom\u00e1tico forzado. Luego, utilizando alguna funci\u00f3n integrada de estas aplicaciones, se pueden iniciar otros programas. Para aprovechar esta vulnerabilidad, las aplicaciones externas deben dejarse en ejecuci\u00f3n cuando se inicia el software KioWare. Adem\u00e1s, un atacante debe conocer el PIN establecido para esta instancia de Kioware y tambi\u00e9n ralentizar la aplicaci\u00f3n con alguna tarea espec\u00edfica que extienda la ventana de tiempo utilizable.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cvd@cert.pl\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.4,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"cvd@cert.pl\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-424\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*\",\"versionEndIncluding\":\"8.34\",\"matchCriteriaId\":\"08120DB6-BEF8-4C1E-B969-3F661CB25C70\"}]}]}],\"references\":[{\"url\":\"https://cert.pl/en/posts/2024/04/CVE-2024-3459\",\"source\":\"cvd@cert.pl\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://cert.pl/posts/2024/04/CVE-2024-3459\",\"source\":\"cvd@cert.pl\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://www.kioware.com/\",\"source\":\"cvd@cert.pl\",\"tags\":[\"Product\"]},{\"url\":\"https://cert.pl/en/posts/2024/04/CVE-2024-3459\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://cert.pl/posts/2024/04/CVE-2024-3459\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://www.kioware.com/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://cert.pl/posts/2024/04/CVE-2024-3459\", \"tags\": [\"third-party-advisory\", \"x_transferred\"]}, {\"url\": \"https://cert.pl/en/posts/2024/04/CVE-2024-3459\", \"tags\": [\"third-party-advisory\", \"x_transferred\"]}, {\"url\": \"https://www.kioware.com/\", \"tags\": [\"product\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T20:12:06.924Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-3460\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-25T18:34:33.771027Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*\"], \"vendor\": \"kioware\", \"product\": \"kioware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.34\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-25T18:35:46.298Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Maksymilian Kubiak [Afine Team]\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Kioware\", \"product\": \"Kioware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.34\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2024-05-09T10:00:00.000Z\", \"references\": [{\"url\": \"https://cert.pl/posts/2024/04/CVE-2024-3459\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://cert.pl/en/posts/2024/04/CVE-2024-3459\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://www.kioware.com/\", \"tags\": [\"product\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In KioWare for Windows (versions all through 8.34)\\u00a0it is possible to exit this software\\u00a0and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs.\\u00a0\\nIn order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know\\u00a0the PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eIn KioWare for Windows (versions all \u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003ethrough 8.34)\u003c/span\u003e\u0026nbsp;it is possible to exit this software\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eand use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs.\u0026nbsp;\u003cbr\u003eIn order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know\u0026nbsp;\u003c/span\u003ethe PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.\u003c/span\u003e\u003cbr\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-424\", \"description\": \"CWE-424 Improper Protection of Alternate Path\"}]}], \"providerMetadata\": {\"orgId\": \"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6\", \"shortName\": \"CERT-PL\", \"dateUpdated\": \"2024-05-09T10:14:30.190Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-3460\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T20:12:06.924Z\", \"dateReserved\": \"2024-04-08T10:30:35.750Z\", \"assignerOrgId\": \"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6\", \"datePublished\": \"2024-05-09T10:13:37.634Z\", \"assignerShortName\": \"CERT-PL\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…