{"containers":{"cna":{"affected":[{"product":"Armoury Crate & Aura Creator Installer (ROG Live Service)","vendor":"ASUS","versions":[{"status":"affected","version":"1.2.18.0"}]}],"datePublic":"2022-01-31T00:00:00.000Z","descriptions":[{"lang":"en","value":"ROG Live Service’s function for deleting temp files created by installation has an improper link resolution before file access vulnerability. Since this function does not validate the path before deletion, an unauthenticated local attacker can create an unexpected symbolic link to system file path, to delete arbitrary system files and disrupt system service."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-59","description":"CWE-59 Improper Link Resolution Before File Access ('Link Following')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-03-01T01:55:18.000Z","orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.twcert.org.tw/tw/cp-132-5693-f108f-1.html"}],"solutions":[{"lang":"en","value":"Update ROG Live Service version to 1.3.3.0"}],"source":{"advisory":"TVN-202201005","discovery":"EXTERNAL"},"title":"ASUS Armoury Crate & Aura Creator Installer之ROG Live Service - Improper Link Resolution Before File Access","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"AKA":"TWCERT/CC","ASSIGNER":"cve@cert.org.tw","DATE_PUBLIC":"2022-01-31T01:24:00.000Z","ID":"CVE-2022-22262","STATE":"PUBLIC","TITLE":"ASUS Armoury Crate & Aura Creator Installer之ROG Live Service - Improper Link Resolution Before File Access"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Armoury Crate & Aura Creator Installer (ROG Live Service)","version":{"version_data":[{"version_affected":"=","version_value":"1.2.18.0"}]}}]},"vendor_name":"ASUS"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"ROG Live Service’s function for deleting temp files created by installation has an improper link resolution before file access vulnerability. Since this function does not validate the path before deletion, an unauthenticated local attacker can create an unexpected symbolic link to system file path, to delete arbitrary system files and disrupt system service."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-59 Improper Link Resolution Before File Access ('Link Following')"}]}]},"references":{"reference_data":[{"name":"https://www.twcert.org.tw/tw/cp-132-5693-f108f-1.html","refsource":"MISC","url":"https://www.twcert.org.tw/tw/cp-132-5693-f108f-1.html"}]},"solution":[{"lang":"en","value":"Update ROG Live Service version to 1.3.3.0"}],"source":{"advisory":"TVN-202201005","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:07:50.316Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.twcert.org.tw/tw/cp-132-5693-f108f-1.html"}]}]},"cveMetadata":{"assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","assignerShortName":"twcert","cveId":"CVE-2022-22262","datePublished":"2022-03-01T01:55:19.047Z","dateReserved":"2021-12-29T00:00:00.000Z","dateUpdated":"2024-09-17T01:45:46.992Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}