First published: Mon May 02 2022(Updated: )
Improper sanitization of trigger action scripts in VanDyke Software VShell for Windows v4.6.2 allows attackers to execute arbitrary code via a crafted value.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Vandyke Vshell | <4.6.3 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28054 has been classified as critical due to improper sanitization allowing arbitrary code execution.
To mitigate CVE-2022-28054, upgrade VShell to version 4.6.3 or later, which addresses the vulnerability.
CVE-2022-28054 affects VanDyke Software VShell for Windows up to version 4.6.2.
Yes, CVE-2022-28054 can be exploited remotely through crafted trigger action scripts.
The potential impacts of CVE-2022-28054 include unauthorized access and execution of arbitrary code on affected systems.