Description
Emocheck insecurely loads Dynamic Link Libraries (DLLs). If a crafted DLL file is placed to the same directory, an arbitrary code may be executed with the privilege of the user invoking EmoCheck.
Published: 2026-04-10
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Local arbitrary code execution
Action: Apply Patch Immediately
AI Analysis

Impact

EmoCheck loads dynamic‑link libraries without validating the source of the DLL files it loads. This flaw enables an attacker to craft a malicious DLL and place it in the same directory as the application. When EmoCheck starts, it will load the DLL and execute its code with the privileges of the user running the program, satisfying the conditions for remote code execution via local modification of the DLL search order. The weakness corresponds to CWE‑427 and can lead to unintended data disclosure, tampering, or full system compromise if the authenticated user has sufficient rights.

Affected Systems

This vulnerability affects the EmoCheck utility distributed by the Japan Computer Emergency Response Team Coordination Center. No specific version numbers were disclosed, so any version of EmoCheck currently in use may be vulnerable until a patch or update is applied.

Risk and Exploitability

The CVSS score of 8.4 indicates a high impact vulnerability. The EPSS score is not available, so the exact likelihood of automated exploitation is unknown. The attack vector is inferred to be local, requiring an attacker to place a malicious DLL in the application's directory—an action that is quite realistic for users who can write files to that location. The flaw is not listed in the CISA KEV catalog, and no public exploits have been reported, yet the combination of high severity and ease of exploitation warrants immediate attention.

Generated by OpenCVE AI on April 10, 2026 at 07:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest EmoCheck patch or upgrade to a version that corrects the DLL loading issue.
  • Limit write permissions on the EmoCheck installation and working directories to prevent unauthorized DLL placement.
  • Monitor JPCERT/CC for additional advisories or updates regarding this vulnerability.

Generated by OpenCVE AI on April 10, 2026 at 07:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title DLL Loading Vulnerability Allowing Local Arbitrary Code Execution in EmoCheck

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Japan Computer Emergency Response Team Coordination Center (jpcert/cc)
Japan Computer Emergency Response Team Coordination Center (jpcert/cc) emocheck
Vendors & Products Japan Computer Emergency Response Team Coordination Center (jpcert/cc)
Japan Computer Emergency Response Team Coordination Center (jpcert/cc) emocheck

Fri, 10 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description Emocheck insecurely loads Dynamic Link Libraries (DLLs). If a crafted DLL file is placed to the same directory, an arbitrary code may be executed with the privilege of the user invoking EmoCheck.
Weaknesses CWE-427
References
Metrics cvssV3_0

{'score': 7.8, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Japan Computer Emergency Response Team Coordination Center (jpcert/cc) Emocheck
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-04-10T14:03:26.770Z

Reserved: 2026-04-03T00:18:56.790Z

Link: CVE-2026-28704

cve-icon Vulnrichment

Updated: 2026-04-10T14:03:23.314Z

cve-icon NVD

Status : Received

Published: 2026-04-10T07:16:21.023

Modified: 2026-04-10T07:16:21.023

Link: CVE-2026-28704

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:38Z

Weaknesses