Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ysoft:safeq:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "EA81585C-2548-449C-B1BF-5288AF23E947", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build32:*:*:*:*:*:*", "matchCriteriaId": "66F8714A-C098-4FB8-BF3C-966466B93CEF", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build33:*:*:*:*:*:*", "matchCriteriaId": "A7E52155-DE90-492E-959A-339E1BE79683", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build34:*:*:*:*:*:*", "matchCriteriaId": "9E53A361-E775-4B7C-B26F-5527EBB74EF8", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build35:*:*:*:*:*:*", "matchCriteriaId": "DC1FB050-F460-43F3-9B08-51A79A93C9E1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build36:*:*:*:*:*:*", "matchCriteriaId": "09BF07DA-47F3-4002-B13B-90409C756476", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build37:*:*:*:*:*:*", "matchCriteriaId": "70E37BAC-9AD5-4F9F-983B-B6AF7D798389", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build38:*:*:*:*:*:*", "matchCriteriaId": "2FEBCEE6-8442-47DD-9417-DAFB90AE54B1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build39:*:*:*:*:*:*", "matchCriteriaId": "E4288C64-E6A4-4724-A991-834B0C7C629E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build40:*:*:*:*:*:*", "matchCriteriaId": "4AECD471-134D-47B7-A35B-0C48659A9CAE", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build41:*:*:*:*:*:*", "matchCriteriaId": "C7BDBDE0-105C-4140-B0EB-843BC8FFDDF7", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build42:*:*:*:*:*:*", "matchCriteriaId": "A7A14715-0C5E-4648-9C8F-52356B11DA91", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build43:*:*:*:*:*:*", "matchCriteriaId": "5F34F1CF-7388-4865-A708-BAEAFB46FDD1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build44:*:*:*:*:*:*", "matchCriteriaId": "5CAA458B-7E04-49F1-9431-B2452379A73C", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build45:*:*:*:*:*:*", "matchCriteriaId": "15173475-41B5-4AB6-BC7B-B0EAB027A2C3", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build46:*:*:*:*:*:*", "matchCriteriaId": "5998894F-5F9E-46FB-9FE9-AA4233C51C48", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build47:*:*:*:*:*:*", "matchCriteriaId": "D81E1C89-B437-4D53-BF47-89E86E4D8E3D", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build48:*:*:*:*:*:*", "matchCriteriaId": "EF786E8D-F04A-450E-9091-EFF3EF43124A", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build49:*:*:*:*:*:*", "matchCriteriaId": "8F2BB4C0-636B-46A6-A0FC-379837F07ED5", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build50:*:*:*:*:*:*", "matchCriteriaId": "91FC2B3E-1E3D-48DB-958B-B50D0085EA7E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build51:*:*:*:*:*:*", "matchCriteriaId": "77687CCE-6778-4E58-AEE0-5586AF22213E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build52:*:*:*:*:*:*", "matchCriteriaId": "48A384EA-4806-462E-AC2F-838608918D0C", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build53:*:*:*:*:*:*", "matchCriteriaId": "ECE640BB-1291-40D3-A5BF-C60DF8074BC8", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build54:*:*:*:*:*:*", "matchCriteriaId": "92739D9A-0931-4F66-A0F5-848854EC0F19", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build55:*:*:*:*:*:*", "matchCriteriaId": "FD7E49DC-DB41-4507-8423-B3A998366FFB", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build56:*:*:*:*:*:*", "matchCriteriaId": "4E909C1A-3EDC-4F14-BBC9-36429EF2F47D", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build57:*:*:*:*:*:*", "matchCriteriaId": "FDE4C452-5059-4118-BCF4-9E6F9D101051", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build58:*:*:*:*:*:*", "matchCriteriaId": "103972CB-9627-4864-9ECC-353DFAE183A9", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build59:*:*:*:*:*:*", "matchCriteriaId": "270DACEF-4164-48EE-A09B-F3AFC3F96922", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build60:*:*:*:*:*:*", "matchCriteriaId": "551D9158-2BA3-41A5-BCC8-1C106C45A6A3", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build61:*:*:*:*:*:*", "matchCriteriaId": "2041E54F-EE13-430C-A356-32DD8C7888D3", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build62:*:*:*:*:*:*", "matchCriteriaId": "2116917F-48DB-406B-AC6D-38E15F8F184A", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build63:*:*:*:*:*:*", "matchCriteriaId": "77009C4D-5A00-48B7-B365-11BA35CE50C7", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build64:*:*:*:*:*:*", "matchCriteriaId": "7DF1389D-B27E-440F-B8BB-1CB86E7700A6", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build65:*:*:*:*:*:*", "matchCriteriaId": "52685F05-BEEE-4E71-92AA-2EDD55BDC86E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build66:*:*:*:*:*:*", "matchCriteriaId": "05305162-0D3E-459E-8607-4CFBCCEF3541", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build67:*:*:*:*:*:*", "matchCriteriaId": "6E35D2CD-89CB-4CCD-A447-A7C228CE6694", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build68:*:*:*:*:*:*", "matchCriteriaId": "1D05FB02-3316-48EC-9D23-FA79684E95F6", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build69:*:*:*:*:*:*", "matchCriteriaId": "2C12ED82-6E48-46FE-B25E-331BED09AE35", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build70:*:*:*:*:*:*", "matchCriteriaId": "B039050F-AC4E-4F48-B2DA-FF5DD70D9503", "vulnerable": true}, {"criteria": "cpe:2.3:a:ysoft:safeq:6.0:build71:*:*:*:*:*:*", "matchCriteriaId": "402ADD85-9FEC-4EF4-9169-2FD84F3C5CBE", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859."}, {"lang": "es", "value": "Se ha detectado un problema en YSoft SAFEQ 6 versiones anteriores a 6.0.72. Fueron configurados privilegios incorrectos como parte del paquete de instalaci\u00f3n de los servicios del Cliente V3, permitiendo una escalada de privilegios del usuario local al sobrescribir el archivo ejecutable por medio de un flujo de datos alternativo. NOTA: esto no es lo mismo que CVE-2021-31859.\n"}], "id": "CVE-2022-38176", "lastModified": "2024-11-21T07:15:56.433", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-09-06T21:15:08.967", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://ysoft.com"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://ysoft.com"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}