Vulnerability Description
An issue found in DUALSPACE Super Secuirty v.2.3.7 allows an attacker to cause a denial of service via the key_wifi_safe_net_check_url, KEY_Cirus_scan_whitelist and KEY_AD_NEW_USER_AVOID_TIME parameters.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dualspace | Super Security | 2.3.7 |
References
- http://www.dualspace.com/pc/en/products.htmlProduct
- https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.securityProduct
- https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27192/CVE%20detail.mdExploitThird Party Advisory
- http://www.dualspace.com/pc/en/products.htmlProduct
- https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.securityProduct
- https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27192/CVE%20detail.mdExploitThird Party Advisory
FAQ
What is CVE-2023-27192?
CVE-2023-27192 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue found in DUALSPACE Super Secuirty v.2.3.7 allows an attacker to cause a denial of service via the key_wifi_safe_net_check_url, KEY_Cirus_scan_whitelist and KEY_AD_NEW_USER_AVOID_TIME paramete...
How severe is CVE-2023-27192?
CVE-2023-27192 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-27192?
Check the references section above for vendor advisories and patch information. Affected products include: Dualspace Super Security.