Intelbras InControl har 2.21.56 incontrol-service-watchdog.exe kura hakki ndiyam

Wuro vulnerability wey an yi classify sey kura an gano shi a cikin Intelbras InControl har 2.21.56. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, C:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exe na cikin fayil, $software_component na cikin sashi. Ngam manipulation shi kura hakki ndiyam. CWE shidin ka a yi bayani matsala sai ya kai CWE-428. Gaskiya, laifi an fitar da shi 09/28/2024. Advisory ɗin ana rabawa don saukewa a backend.intelbras.com. Wannan rauni ana sayar da shi da suna CVE-2024-9325. Wuroo ka a yiɗi a yi ɗum e laawol gese. Tekinikal bayani ga. Ba exploit ɗin da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á wúro a wondi feere. Kama 0-day, an ndiyam a wuro be $0-$5k. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a hokkata. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

5 Goyarwa · 100 Datenpunkte

FurɗeSúgá
09/28/2024 15:36
Gargadi 1/4
09/29/2024 13:08
Gargadi 2/4
10/07/2024 19:20
Gargadi 3/4
11/04/2024 20:17
Gargadi 4/4
11/05/2024 06:47
software_vendorIntelbrasIntelbrasIntelbrasIntelbrasIntelbras
software_nameInControlInControlInControlInControlInControl
software_version<=2.21.56<=2.21.56<=2.21.56<=2.21.56<=2.21.56
software_fileC:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exeC:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exeC:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exeC:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exeC:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exe
vulnerability_cweCWE-428 (kura hakki ndiyam)CWE-428 (kura hakki ndiyam)CWE-428 (kura hakki ndiyam)CWE-428 (kura hakki ndiyam)CWE-428 (kura hakki ndiyam)
vulnerability_risk22222
cvss3_vuldb_avLLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cHHHHH
cvss3_vuldb_iHHHHH
cvss3_vuldb_aHHHHH
cvss3_vuldb_rcCCCCC
source_cveCVE-2024-9325CVE-2024-9325CVE-2024-9325CVE-2024-9325CVE-2024-9325
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.
cvss2_vuldb_avLLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciCCCCC
cvss2_vuldb_iiCCCCC
cvss2_vuldb_aiCCCCC
cvss2_vuldb_rcCCCCC
cvss4_vuldb_avLLLLL
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcHHHHH
cvss4_vuldb_viHHHHH
cvss4_vuldb_vaHHHHH
cvss2_vuldb_auSSSSS
cvss2_vuldb_eNDNDNDNDND
cvss2_vuldb_rlNDNDNDOFOF
cvss3_vuldb_eXXXXX
cvss3_vuldb_rlXXXOO
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss4_vuldb_eXXXXX
cvss2_vuldb_basescore6.86.86.86.86.8
cvss2_vuldb_tempscore6.86.86.85.95.9
cvss3_vuldb_basescore7.87.87.87.87.8
cvss3_vuldb_tempscore7.87.87.87.57.5
cvss3_meta_basescore7.87.87.87.87.8
cvss3_meta_tempscore7.87.87.87.77.7
cvss4_vuldb_bscore8.58.58.58.58.5
cvss4_vuldb_btscore8.58.58.58.58.5
advisory_date1727474400 (09/28/2024)1727474400 (09/28/2024)1727474400 (09/28/2024)1727474400 (09/28/2024)1727474400 (09/28/2024)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability classified as critical has been found in Intelbras InControl up to 2.21.56. This affects an unknown part of the file C:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.A vulnerability classified as critical has been found in Intelbras InControl up to 2.21.56. This affects an unknown part of the file C:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.A vulnerability classified as critical has been found in Intelbras InControl up to 2.21.56. This affects an unknown part of the file C:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.A vulnerability classified as critical has been found in Intelbras InControl up to 2.21.56. This affects an unknown part of the file C:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20.
cvss3_cna_avLLLL
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cHHHH
cvss3_cna_iHHHH
cvss3_cna_aHHHH
cvss3_cna_basescore7.87.87.87.8
cvss2_cna_avLLLL
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciCCCC
cvss2_cna_iiCCCC
cvss2_cna_aiCCCC
cvss2_cna_basescore6.86.86.86.8
cve_nvd_summaryesSe ha detectado una vulnerabilidad clasificada como crítica en Intelbras InControl hasta la versión 2.21.56. Afecta a una parte desconocida del archivo C:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exe. La manipulación conduce a una ruta de búsqueda sin comillas. Es posible lanzar el ataque en el host local. El proveedor fue informado de este problema el 5 de agosto de 2024. El lanzamiento de una versión corregida 2.21.58 se anunció para fines de agosto de 2024, pero luego se pospuso hasta el 20 de septiembre de 2024.Se ha detectado una vulnerabilidad clasificada como crítica en Intelbras InControl hasta la versión 2.21.56. Afecta a una parte desconocida del archivo C:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exe. La manipulación conduce a una ruta de búsqueda sin comillas. Es posible lanzar el ataque en el host local. El proveedor fue informado de este problema el 5 de agosto de 2024. El lanzamiento de una versión corregida 2.21.58 se anunció para fines de agosto de 2024, pero luego se pospuso hasta el 20 de septiembre de 2024.Se ha detectado una vulnerabilidad clasificada como crítica en Intelbras InControl hasta la versión 2.21.56. Afecta a una parte desconocida del archivo C:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exe. La manipulación conduce a una ruta de búsqueda sin comillas. Es posible lanzar el ataque en el host local. El proveedor fue informado de este problema el 5 de agosto de 2024. El lanzamiento de una versión corregida 2.21.58 se anunció para fines de agosto de 2024, pero luego se pospuso hasta el 20 de septiembre de 2024.
cvss3_nvd_avLLL
cvss3_nvd_acLLL
cvss3_nvd_prLLL
cvss3_nvd_uiNNN
cvss3_nvd_sUUU
cvss3_nvd_cHHH
cvss3_nvd_iHHH
cvss3_nvd_aHHH
cvss3_nvd_basescore7.87.87.8
advisory_urlhttps://backend.intelbras.com/sites/default/files/2024-10/Aviso%20de%20Seguran%C3%A7a%20-%20Incontrol%202.21.56%20e%202.21.57.pdfhttps://backend.intelbras.com/sites/default/files/2024-10/Aviso%20de%20Seguran%C3%A7a%20-%20Incontrol%202.21.56%20e%202.21.57.pdf
countermeasure_nameGargajiyaGargajiya
upgrade_version2.21.582.21.58
countermeasure_upgrade_urlhttps://download.cronos.intelbras.com.br/download/INCONTROL/INCONTROL-WEB/prod/INCONTROL-WEB-2.21.58-233dfd1ac1e2ca3eabb71c854005c78b.exehttps://download.cronos.intelbras.com.br/download/INCONTROL/INCONTROL-WEB/prod/INCONTROL-WEB-2.21.58-233dfd1ac1e2ca3eabb71c854005c78b.exe
cvss4_cna_avL
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcH
cvss4_cna_viH
cvss4_cna_vaH
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore8.5

Interested in the pricing of exploits?

See the underground prices here!