2024-05-30 02:03:22 +00:00

71 lines
2.6 KiB
JSON

{
"id": "CVE-2024-4978",
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2024-05-23T02:15:09.257",
"lastModified": "2024-05-30T01:00:02.063",
"vulnStatus": "Awaiting Analysis",
"cisaExploitAdd": "2024-05-29",
"cisaActionDue": "2024-06-19",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "Justice AV Solutions Viewer Setup 8.3.7.250-1 contains a malicious binary when executed and is signed with an unexpected authenticode signature. A remote, privileged threat actor may exploit this vulnerability to execute of unauthorized PowerShell commands."
},
{
"lang": "es",
"value": "Justice AV Solutions Viewer Setup 8.3.7.250-1 contiene un binario malicioso cuando se ejecuta y est\u00e1 firmado con una firma de c\u00f3digo de autenticaci\u00f3n inesperada. Un actor de amenazas remoto y privilegiado puede aprovechar esta vulnerabilidad para ejecutar comandos de PowerShell no autorizados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-506"
}
]
}
],
"references": [
{
"url": "https://twitter.com/2RunJack2/status/1775052981966377148",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://www.javs.com/downloads/",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
},
{
"url": "https://www.rapid7.com/blog/post/2024/05/23/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack/",
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
}
]
}