TAIWAN-CA(TWCA) JCICSecurityTool fails to check the source website and access locations when executing multiple Registry-related functions. In the scenario where a user is using the JCICSecurityTool and has completed identity verification, if the user browses a malicious webpage created by an attacker, the attacker can exploit this vulnerability to read or modify any registry file under HKEY_CURRENT_USER, thereby achieving remote code execution.
References
Link Resource
https://www.twcert.org.tw/tw/cp-132-7602-a47a2-1.html Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: twcert

Published: 2023-12-15T08:40:34.306Z

Updated: 2024-01-31T02:12:57.800Z

Reserved: 2023-11-16T03:52:23.443Z


Link: CVE-2023-48387

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-12-15T09:15:08.357

Modified: 2024-01-31T03:15:08.213


Link: CVE-2023-48387

JSON object: View

cve-icon Redhat Information

No data.