Risk | Low |
Patch available | NO |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2024-4229 CVE-2024-4230 |
CWE-ID | CWE-276 CWE-73 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Edgecross Basic Software for Windows ECP-BS1-W Other software / Other software solutions Edgecross Basic Software for Developers ECP-BS1-W-D Other software / Other software solutions |
Vendor | Edgecross Consortium |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU100776
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-4229
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code on the system.
The vulnerability exists due to incorrect default permissions. A local user can execute arbitrary code on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsEdgecross Basic Software for Windows ECP-BS1-W: - - 1.00
Edgecross Basic Software for Developers ECP-BS1-W-D: - - 1.00
CPE2.3https://jvn.jp/en/vu/JVNVU92857077/index.html
https://www.edgecross.org/client_info/EDGECROSS/view/userweb/ext/en/data-download/pdf/ECD-TE10-0003-01-EN.pdf
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100777
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-4230
CWE-ID:
CWE-73 - External Control of File Name or Path
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code on the system.
The vulnerability exists due to application allows an attacker to control path of the files. A local user can execute arbitrary code on the target system.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsEdgecross Basic Software for Windows ECP-BS1-W: - - 1.00
Edgecross Basic Software for Developers ECP-BS1-W-D: - - 1.00
CPE2.3https://jvn.jp/en/vu/JVNVU92857077/index.html
https://www.edgecross.org/client_info/EDGECROSS/view/userweb/ext/en/data-download/pdf/ECD-TE10-0003-01-EN.pdf
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.