Published:2024/07/29  Last Updated:2024/07/29

JVN#84326763
Multiple vulnerabilities in SKYSEA Client View

Overview

SKYSEA Client View provided by Sky Co.,LTD. contains multiple vulnerabilities.

Products Affected

CVE-2024-41139

  • SKYSEA Client View versions from Ver.6.010.06 to Ver.19.210.04e
CVE-2024-41143
  • SKYSEA Client View versions from Ver.3.013.00 to Ver.19.210.04e
CVE-2024-41726
  • SKYSEA Client View versions from Ver.15.200.13i to Ver.19.210.04e

Description

SKYSEA Client View provided by Sky Co.,LTD. is an Enterprise IT Asset Management Tool.
SKYSEA Client View contains multiple vulnerabilities listed below.

  • Improper access control in the specific process (CWE-266)
    • CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Base Score 7.8
    • CVE-2024-41139
  • Origin validation error in shared memory data exchanges (CWE-346)
    • CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Base Score 7.8
    • CVE-2024-41143
  • Path traversal (CWE-22)
    • CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Base Score 7.5
    • CVE-2024-41726

Impact

  • If a user who can log in to the PC where the product's Windows client is installed places a specially crafted DLL file in a specific folder, arbitrary code may be executed with SYSTEM privilege (CVE-2024-41139)
  • An arbitrary process may be executed with SYSTEM privilege by a user who can log in to the PC where the product's Windows client is installed (CVE-2024-41143)
  • An arbitrary executable file may be executed by a user who can log in to the PC where the product's Windows client is installed (CVE-2024-41726)

Solution

Update the software
Update the software to the latest version according to the information provided by the developer.
The developer has released SKYSEA Client View Ver.19.3 that addresses these vulnerabilities.

Apply the patch
For SKYSEA Client View Ver.17.0 to Ver.19.210.04e, the developer has released patches that contain fixes for these vulnerabilities.
For more details, refer to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Ruslan Sayfiev, and Denis Faiustov of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to Sky Co.,LTD. and coordinated. Sky Co.,LTD. and JPCERT/CC published respective advisories in order to notify users of the solutions through JVN.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-41139
CVE-2024-41143
CVE-2024-41726
JVN iPedia JVNDB-2024-000074

Update History

2024/07/29
Information under the section [Products Affected] and [Solution] was updated