Description
A vulnerability has been identified in SICAM PQ Analyzer (All versions < V3.18). A service is started by an unquoted registry entry. As there are spaces in this path, attackers with write privilege to those directories might be able to plant executables that will run in place of the legitimate process. Attackers might achieve persistence on the system ("backdoors") or cause a denial of service.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-32226 | A vulnerability has been identified in SICAM PQ Analyzer (All versions < V3.18). A service is started by an unquoted registry entry. As there are spaces in this path, attackers with write privilege to those directories might be able to plant executables that will run in place of the legitimate process. Attackers might achieve persistence on the system ("backdoors") or cause a denial of service. |
References
History
No history.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-08-04T04:39:21.093Z
Reserved: 2021-12-22T00:00:00.000Z
Link: CVE-2021-45460
No data.
Status : Modified
Published: 2022-01-11T12:15:10.193
Modified: 2024-11-21T06:32:15.223
Link: CVE-2021-45460
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD