{ "id": "CVE-2022-31467", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-23T19:16:07.813", "lastModified": "2024-11-21T07:04:30.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A DLL hijacking vulnerability in the installed for Quick Heal Total Security prior to 12.1.1.27 allows a local attacker to achieve privilege escalation, leading to execution of arbitrary code, via the installer not restricting the search path for required DLLs and then not verifying the signature of the DLLs it tries to load." }, { "lang": "es", "value": "Una vulnerabilidad de secuestro de DLL en el instalador de Quick Heal Total Security anterior a la versi\u00f3n 12.1.1.27 permite a un atacante local conseguir una escalada de privilegios, lo que lleva a la ejecuci\u00f3n de c\u00f3digo arbitrario, a trav\u00e9s de que el instalador no restringe la ruta de b\u00fasqueda de las DLL necesarias y no verifica la firma de las DLL que intenta cargar" } ], "metrics": { "cvssMetricV31": [ { "source": "cve@mitre.org", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H", "baseScore": 7.9, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.5, "impactScore": 5.8 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.3, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-427" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:quickheal:total_security:*:*:*:*:*:*:*:*", "versionEndExcluding": "12.1.1.27", "matchCriteriaId": "E727BFA3-BF0E-49E6-93E7-826AC1900CCB" } ] } ] } ], "references": [ { "url": "https://softwaresec001.wordpress.com/2022/05/13/dll-hijack-vulnerability-fixed-in-quick-heal-total-security/", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://softwaresec001.wordpress.com/2022/05/13/dll-hijack-vulnerability-fixed-in-quick-heal-total-security/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] } ] }