CVE-2022-32427
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
PrinterLogic Windows Client through 25.0.0.676 allows attackers to execute directory traversal. Authenticated users with prior knowledge of the driver filename could exploit this to escalate privileges or distribute malicious content. This issue has been resolved in PrinterLogic Windows Client 25.0.0688 and all affected are advised to upgrade.
El cliente de Windows de PrinterLogic hasta la versión 25.0.0.676 permite que los atacantes ejecuten el cruce de directorios. Los usuarios autentificados con conocimiento previo del nombre de archivo del controlador podrían aprovechar esta situación para escalar privilegios o distribuir contenido malicioso. Este problema se ha resuelto en PrinterLogic Windows Client 25.0.0688 y se recomienda a todos los afectados que actualicen
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-06-05 CVE Reserved
- 2022-08-25 CVE Published
- 2024-03-17 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://docs.printercloud.com/1-Printerlogic/Release_Notes/Client_Release_Notes.htm?tocpath=_____9 | 2023-02-10 | |
https://www.printerlogic.com/security-bulletin | 2023-02-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Printerlogic Search vendor "Printerlogic" | Windows Client Search vendor "Printerlogic" for product "Windows Client" | < 25.0.0688 Search vendor "Printerlogic" for product "Windows Client" and version " < 25.0.0688" | - |
Affected
|