Impact
NAVER MYBOX Explorer for Windows versions prior to 3.0.11.160 contain a flaw that enables a local attacker to elevate privileges to NT AUTHORITY\SYSTEM by manipulating the registry. The vulnerability arises from improper privilege checks that allow changes to registry keys controlling application behavior, granting the attacker unrestricted access to system resources. This represents a high‑impact escalation of privileges that could lead to full system compromise if exploited.
Affected Systems
The affected product is NAVER MYBOX Explorer for Windows, specifically all releases before version 3.0.11.160. Users running these legacy versions are at risk until the updated release is deployed.
Risk and Exploitability
The CVSS score is not provided, but the absence of an EPSS score suggests limited publicly known exploitation. The vulnerability is not listed in the CISA KEV catalog, indicating no confirmed widespread exploitation yet. However, the attack vector is local, meaning the attacker must already have physical or remote access to the target machine. If an attacker can become a local user, the privilege escalation can be achieved by modifying the relevant registry entries, bypassing normal access controls.
OpenCVE Enrichment