First published: Wed Apr 29 2020(Updated: )
AxECM.cab(ActiveX Control) in Inogard Ebiz4u contains a vulnerability that could allow remote files to be downloaded and executed by setting arguments to the activeX method. Download of Code Without Integrity Check vulnerability in ActiveX control of Inogard Co,,LTD Ebiz4u ActiveX of Inogard Co,,LTD(AxECM.cab) allows ATTACKER to cause a file download to Windows user's folder and execute. This issue affects: Inogard Co,,LTD Ebiz4u ActiveX of Inogard Co,,LTD(AxECM.cab) version 1.0.5.0 and later versions on windows 7/8/10.
Credit: vuln@krcert.or.kr
Affected Software | Affected Version | How to fix |
---|---|---|
Inogard Activex | <1.0.5.0 | |
Microsoft Windows 10 | ||
Microsoft Windows 7 | ||
Microsoft Windows 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-19165.
The title of this vulnerability is 'AxECM.cab(ActiveX Control) in Inogard Ebiz4u contains a vulnerability that could allow remote files to be downloaded and executed by setting arguments to the activeX method.'
The severity of CVE-2019-19165 is high with a score of 7.2.
The affected software is Inogard Activex up to version 1.0.5.0 and Microsoft Windows 10, Windows 7, and Windows 8 are not vulnerable.
The vulnerability can be exploited by setting arguments to the activeX method in the AxECM.cab(ActiveX Control) in Inogard Ebiz4u, allowing remote files to be downloaded and executed.