{"containers":{"cna":{"affected":[{"platforms":["Windows"],"product":"WebCube","vendor":"TERUTEN Co.,Ltd","versions":[{"lessThan":"1.2.0.0","status":"affected","version":"1.0.5.5","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"The vulnerability causing from insufficient verification procedures for downloaded files during WebCube update. Remote attackers can bypass this verification logic to update both digitally signed and unauthorized files, enabling remote code execution."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-346","description":"CWE-346 Origin Validation Error","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-08-17T20:23:03.000Z","orgId":"cdd7a122-0fae-4202-8d86-14efbacc2863","shortName":"krcert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66876"}],"source":{"discovery":"UNKNOWN"},"title":"TERUTEN WebCube update remote code execution vulnerability","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vuln@krcert.or.kr","ID":"CVE-2022-23764","STATE":"PUBLIC","TITLE":"TERUTEN WebCube update remote code execution vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"WebCube","version":{"version_data":[{"platform":"Windows","version_affected":"<","version_name":"1.0.5.5","version_value":"1.2.0.0"}]}}]},"vendor_name":"TERUTEN Co.,Ltd"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The vulnerability causing from insufficient verification procedures for downloaded files during WebCube update. Remote attackers can bypass this verification logic to update both digitally signed and unauthorized files, enabling remote code execution."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-346 Origin Validation Error"}]}]},"references":{"reference_data":[{"name":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66876","refsource":"MISC","url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66876"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:51:46.048Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=66876"}]}]},"cveMetadata":{"assignerOrgId":"cdd7a122-0fae-4202-8d86-14efbacc2863","assignerShortName":"krcert","cveId":"CVE-2022-23764","datePublished":"2022-08-17T20:23:03.000Z","dateReserved":"2022-01-19T00:00:00.000Z","dateUpdated":"2024-08-03T03:51:46.048Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}