First published: Tue Feb 01 2022(Updated: )
Element Desktop is a Matrix client for desktop platforms with Element Web at its core. Element Desktop before 1.9.7 is vulnerable to a remote program execution bug with user interaction. The exploit is non-trivial and requires clicking on a malicious link, followed by another button click. To the best of our knowledge, the vulnerability has never been exploited in the wild. If you are using Element Desktop < 1.9.7, we recommend upgrading at your earliest convenience. If successfully exploited, the vulnerability allows an attacker to specify a file path of a binary on the victim's computer which then gets executed. Notably, the attacker does *not* have the ability to specify program arguments. However, in certain unspecified configurations, the attacker may be able to specify an URI instead of a file path which then gets handled using standard platform mechanisms. These may allow exploiting further vulnerabilities in those mechanisms, potentially leading to arbitrary code execution.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Element Desktop | <1.9.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23597 has a severity classified as high due to the potential for remote code execution.
To fix CVE-2022-23597, update Element Desktop to version 1.9.7 or later.
CVE-2022-23597 affects Element Desktop versions prior to 1.9.7 on desktop platforms.
The attack vector for CVE-2022-23597 requires user interaction, specifically clicking a malicious link and a subsequent button.
The implications of CVE-2022-23597 include the potential for an attacker to execute arbitrary code on the victim's machine.