JVN#84326763
Multiple vulnerabilities in SKYSEA Client View
Overview
SKYSEA Client View provided by Sky Co.,LTD. contains multiple vulnerabilities.
Products Affected
CVE-2024-41139
- SKYSEA Client View versions from Ver.6.010.06 to Ver.19.210.04e
- SKYSEA Client View versions from Ver.3.013.00 to Ver.19.210.04e
- SKYSEA Client View versions from Ver.15.200.13i to Ver.19.210.04e
Description
SKYSEA Client View provided by Sky Co.,LTD. is an Enterprise IT Asset Management Tool.
SKYSEA Client View contains multiple vulnerabilities listed below.
- Improper access control in the specific process (CWE-266)
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Base Score 7.8
- CVE-2024-41139
- Origin validation error in shared memory data exchanges (CWE-346)
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Base Score 7.8
- CVE-2024-41143
- Path traversal (CWE-22)
- CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Base Score 7.5
- CVE-2024-41726
Impact
- If a user who can log in to the PC where the product's Windows client is installed places a specially crafted DLL file in a specific folder, arbitrary code may be executed with
SYSTEM
privilege (CVE-2024-41139) - An arbitrary process may be executed with
SYSTEM
privilege by a user who can log in to the PC where the product's Windows client is installed (CVE-2024-41143) - An arbitrary executable file may be executed by a user who can log in to the PC where the product's Windows client is installed (CVE-2024-41726)
Solution
Update the software
Update the software to the latest version according to the information provided by the developer.
The developer has released SKYSEA Client View Ver.19.3 that addresses these vulnerabilities.
Apply the patch
For SKYSEA Client View Ver.17.0 to Ver.19.210.04e, the developer has released patches that contain fixes for these vulnerabilities.
For more details, refer to the information provided by the developer.
Vendor Status
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Ruslan Sayfiev, and Denis Faiustov of GMO Cybersecurity by Ierae, Inc. reported these vulnerabilities to Sky Co.,LTD. and coordinated. Sky Co.,LTD. and JPCERT/CC published respective advisories in order to notify users of the solutions through JVN.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2024-41139 |
CVE-2024-41143 |
|
CVE-2024-41726 |
|
JVN iPedia |
JVNDB-2024-000074 |
Update History
- 2024/07/29
- Information under the section [Products Affected] and [Solution] was updated