Impact
An OS command injection vulnerability exists in LogonTracer before version 2.0.0, allowing any logged‑in user to execute arbitrary operating‑system commands. This flaw, catalogued as CWE‑78, gives an attacker the potential to compromise system confidentiality, integrity, and availability at the level of the authenticated user.
Affected Systems
Any deployment of LogonTracer that is not updated to version 2.0.0 or newer is affected. This includes all versions prior to 2.0.0 as identified by JPCERT/CC.
Risk and Exploitability
The CVSS score of 8.7 marks this vulnerability as high severity. The EPSS score is reported as less than 1%, indicating low current exploitation probability, and it is not listed in the CISA KEV catalog. The weakness can be exploited by a logged‑in user; no remote exploitation path is documented in the description.
OpenCVE Enrichment