Dylib Injection Vulnerability in Phiewer Affects User Data Security
CVE-2024-53407
3.3LOW
Key Information:
- Vendor
- Phiewer
- Status
- Phiewer
- Vendor
- CVE Published:
- 15 January 2025
Badges
👾 Exploit Exists🟡 Public PoC
Summary
In Phiewer version 4.1.0, a dylib injection vulnerability allows attackers to execute arbitrary commands on the system. This could enable malicious actors to inject harmful dylib files, granting them potential remote control and access to sensitive user information. Vigilance and timely updates are crucial in mitigating the risks associated with this security flaw.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
3.3
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved