668
VMScore

CVE-2022-24934

Published: 23/03/2022 Updated: 31/03/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

wpsupdater.exe in Kingsoft WPS Office up to and including 11.2.0.10382 allows remote code execution by modifying HKEY_CURRENT_USER in the registry.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wps wps office

Github Repositories

CVE-2022-24934

CVE-2022-24934 CVE-2022-24934

CVE-2022-25943

CVE-2022-24934 漏洞概述 WPS Office安装时,会以管理员权限安装服务程序wpscloudsvr,该服务程序配置为手动启动,但错误配置了该服务程序所在文件夹的访问控制列表(ACL)属性,普通Users组成员仍然对该文件夹有读写权限。 影响范围 WPS Office版本小于112010258均存在该漏洞。 (WPS版本号看最

Warning THIS PROGRAM USE GENERIC WHICH IS INTRODUCED IN GO 118, UPGRADE YOUR COMPILER! CVE-2022-24934 Web Server for exploiting this vuln by utilizing wpsupdateexe Fake WPS Update Server PoC Research Purpose Only Download file Set the file you want to send to client as environment variable: HACK_WPS_FILENAME This malicious file should be "SigThief-ed" using Kingsof

CVE-2022-24934 漏洞概述 WPS Office的更新程序wpsupdateexe从注册表HKEY_CURRENT_USER中读取自定义的更新服务器地址,下载自定义的更新程序并执行,导致任意代码执行。 影响范围 WPS Office版本小于或等于112010382均存在该漏洞。 (WPS版本号看最后一组,最后一组数字大即为新版本,111表示个人版