{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-27595","assignerOrgId":"2fd009eb-170a-4625-932b-17a53af1051f","state":"PUBLISHED","assignerShortName":"qnap","dateReserved":"2022-03-21T22:02:33.326Z","datePublished":"2024-12-19T01:39:46.448Z","dateUpdated":"2024-12-20T17:41:46.284Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"QVPN Windows","vendor":"QNAP Systems Inc.","versions":[{"lessThan":"2.0.0.1316","status":"affected","version":"2.0.x","versionType":"custom"},{"lessThan":"2.0.0.1310","status":"affected","version":"2.0.x","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Runzi Zhao, Security Researcher, QI-ANXIN"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An insecure library loading vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local attackers who have gained user access to execute unauthorized code or commands.<br><br>We have already fixed the vulnerability in the following versions:<br>QVPN Windows 2.0.0.1316 and later<br>QVPN Windows 2.0.0.1310 and later<br>"}],"value":"An insecure library loading vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local attackers who have gained user access to execute unauthorized code or commands.\n\nWe have already fixed the vulnerability in the following versions:\nQVPN Windows 2.0.0.1316 and later\nQVPN Windows 2.0.0.1310 and later"}],"impacts":[{"capecId":"CAPEC-38","descriptions":[{"lang":"en","value":"CAPEC-38"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-427","description":"CWE-427","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"2fd009eb-170a-4625-932b-17a53af1051f","shortName":"qnap","dateUpdated":"2024-12-19T01:39:46.448Z"},"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-23-04"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"We have already fixed the vulnerability in the following versions:<br>QVPN Windows 2.0.0.1316 and later<br>QVPN Windows 2.0.0.1310 and later<br>"}],"value":"We have already fixed the vulnerability in the following versions:\nQVPN Windows 2.0.0.1316 and later\nQVPN Windows 2.0.0.1310 and later"}],"source":{"advisory":"QSA-23-04","discovery":"EXTERNAL"},"title":"QVPN Device Client","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-20T16:59:39.320965Z","id":"CVE-2022-27595","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-20T17:41:46.284Z"}}]}}