CVE-2024-29863
 
Severity Score
7.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
A race condition in the installer executable in Qlik Qlikview before versions May 2022 SR3 (12.70.20300) and May 2023 SR2 (12,80.20200) may allow an existing lower privileged user to cause code to be executed in the context of a Windows Administrator.
Una condición de ejecución en instalador ejecutable en Qlik Qlikview anterior a las versiones SR3 de mayo de 2022 (12.70.20300) y SR2 de mayo de 2023 (12,80.20200) puede permitir que un usuario existente con privilegios inferiores haga que el código se ejecute en el contexto de un administrador de Windows.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-03-21 CVE Reserved
- 2024-04-05 CVE Published
- 2024-04-05 EPSS Updated
- 2024-07-22 First Exploit
- 2024-09-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://community.qlik.com/t5/Official-Support-Articles/High-Severity-Security-fix-for-QlikView-CVE-2024-29863/ta-p/2432661 |
URL | Date | SRC |
---|---|---|
https://github.com/pawlokk/qlikview-poc-CVE-2024-29863 | 2024-07-22 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|