CVE ID | CVE-2024-3459 |
Publication date | 09 May 2024 |
Vendor | Kioware |
Product | Kioware for Windows |
Vulnerable versions | all through 8.34 |
Vulnerability type (CWE) | Improper Protection of Alternate Path (CWE-424) |
Report source | Report to CERT Polska |
CVE ID | CVE-2024-3460 |
Publication date | 09 May 2024 |
Vendor | Kioware |
Product | Kioware for Windows |
Vulnerable versions | all through 8.34 |
Vulnerability type (CWE) | Improper Protection of Alternate Path (CWE-424) |
Report source | Report to CERT Polska |
CVE ID | CVE-2024-3461 |
Publication date | 09 May 2024 |
Vendor | Kioware |
Product | Kioware for Windows |
Vulnerable versions | all through 8.35 |
Vulnerability type (CWE) | Improper Restriction of Excessive Authentication Attempts (CWE-307) |
Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerabilities in Kioware for Windows software and participated in coordination of their disclosure.
The vulnerability CVE-2024-3459 in KioWare for Windows (all versions through 8.34) allows to escape the environment by downloading PDF files, which then by default are opened in an external PDF viewer. By using built-in functions of that viewer it is possible to launch a web browser, search through local files and, subsequently, launch any program with user privileges.
The vulnerability CVE-2024-3460 in KioWare for Windows (all versions through 8.34) allows to exit the software and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs. In order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know the PIN (see CVE-2024-3461) set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.
The vulnerability CVE-2024-3461 in KioWare for Windows (all version through 8.35) allows to brute force the PIN number, which protects the application from being closed, as there are no mechanisms preventing a user from excessively guessing the number.
Credits
We thank Maksymilian Kubiak from Afine Team for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.