CVE-2022-38176

An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ysoft:safeq:6.0:-:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build32:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build33:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build34:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build35:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build36:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build37:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build38:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build39:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build40:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build41:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build42:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build43:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build44:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build45:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build46:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build47:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build48:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build49:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build50:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build51:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build52:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build53:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build54:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build55:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build56:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build57:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build58:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build59:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build60:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build61:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build62:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build63:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build64:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build65:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build66:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build67:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build68:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build69:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build70:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build71:*:*:*:*:*:*

History

21 Nov 2024, 07:15

Type Values Removed Values Added
References () https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation - Vendor Advisory () https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation - Vendor Advisory
References () https://ysoft.com - Vendor Advisory () https://ysoft.com - Vendor Advisory

01 Nov 2024, 16:31

Type Values Removed Values Added
CPE cpe:2.3:a:ysoft:safeq:6.0:build71:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build68:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build42:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build36:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build46:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build57:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build41:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build49:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build53:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:-:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build32:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build40:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build64:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build37:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build48:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build62:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build65:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build61:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build63:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build59:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build69:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build43:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build44:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build54:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build67:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build35:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build45:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build52:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build70:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build56:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build34:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build66:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build51:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build58:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build50:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build33:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build55:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build38:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build60:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build39:*:*:*:*:*:*
cpe:2.3:a:ysoft:safeq:6.0:build47:*:*:*:*:*:*
First Time Ysoft safeq
Ysoft

30 Oct 2024, 16:17

Type Values Removed Values Added
CPE cpe:2.3:a:ysoft:safeq:*:*:*:*:*:*:*:*

Information

Published : 2022-09-06 21:15

Updated : 2024-11-21 07:15


NVD link : CVE-2022-38176

Mitre link : CVE-2022-38176

CVE.ORG link : CVE-2022-38176


JSON object : View

Products Affected

ysoft

  • safeq