Skip to main content

Safety-related information Vulnerability KX driver

Vulnerability in KX driver (CVE-2023-38634)

I. Summary of the vulnerability

Publication:
24.05.2023
Description:
CVE-2023-38634
: The following vulnerability has been identified in KX Driver: Authorization Vulnerability.
The vulnerability relates to a vulnerability known as Microsoft Windows Unquoted Service Path Enumeration. An executable path vulnerability and the creation of an unquoted service could allow an attacker to execute arbitrary programs (e.g., malware) with Windows system privileges.
It is possible to revoke Windows system privileges, and it is possible to spy on information that exists under Windows or to perform an attack with system privileges.
However, the attacker must have access to the target Windows system to do so.
 
Affected products:
Software products that are affected by a similar vulnerability:
  • Status Monitor
  • TA Fleetmanager NetGateway
  • Device Manager
  • TA Cloud Print and Scan Desktop client
  • TA Smart Information Manager (TASIM)
At the time of this publication, we are not aware of any attacks that exploit these vulnerabilities.

II. Solution description

As a countermeasure, a new KX Driver web package is available that addresses the vulnerability. We recommend installing the latest driver.

Release of update versions for the affected products
KX Driver (incl. Status Monitor)                   published
TA Fleetmanager NetGateway                     published
Device Manager                                              published
TA Cloud Print and Scan                               published
TA Smart Information Manager (TASIM)   published