Abstract Advisory Information


The software is prone to a DLL hijacking attack, allowing a user to trigger the execution of arbitrary code every time the product is executed.

Author: Dominique Righetto

Version affected


Name: REGIFY

Product: Regipay Client

Versions: 4.5.1.0

Common Vulnerability Scoring System


2.4

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Patches


4.5.2

References


Vulnerability Disclosure Timeline


  • 18/11/2023: Vulnerability discovery
  • 20/11/2023: Vulnerability Report to CERT-XLM
  • 21/11/2023: Review by CERT-XLM
  • 21/11/2023: Contact vendor over the phone
  • 21/11/2023: Vendor gave point of contact
  • 21/11/2023: Vulnerability report sent to the vendor
  • 21/11/2023: Acknowledge from the vendor
  • 22/11/2023: Update from the vendor: Fix is ongoing
  • 28/11/2023: Updated vendor about publication
  • 12/12/2023: Update asked to the vendor
  • 18/12/2023: Vendor informed the vulnerability is fixed
  • 20/12/2023: Request CVE ID to Mitre
  • 22/12/2023: CVE ID assigned : CVE-2023-51711
  • 22/01/2024: Vulnerability disclosure