Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2017-12778 |
CWE-ID | CWE-287 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
qBittorrent Client/Desktop applications / Other client software |
Vendor | qbittorrent.org |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU35921
Risk: Low
CVSSv4.0: 5.8 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2017-12778
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to read and manipulate data.
** DISPUTED ** The UI Lock feature in qBittorrent version 3.3.15 is vulnerable to Authentication Bypass, which allows Attack to gain unauthorized access to qBittorrent functions by tampering the affected flag value of the config file at the C:Users<username>RoamingqBittorrent pathname. The attacker must change the value of the "locked" attribute to "false" within the "Locking" stanza. NOTE: This is an intended behavior. See https://github.com/qbittorrent/qBittorrent/wiki/I-forgot-my-UI-lock-password.
MitigationInstall update from vendor's website.
Vulnerable software versionsqBittorrent: 3.3.15
CPE2.3 External linkshttps://archive.is/eF2GR
https://github.com/qbittorrent/qBittorrent/wiki/I-forgot-my-UI-lock-password
https://medium.com/@BaYinMin/cve-2017-12778-qbittorrent-ui-lock-authentication-bypass-30959ff55ada
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.