CVE-2025-34324
中文标题:
(暂无数据)
英文标题:
GoSign Desktop < 2.4.1 Insecure Update Mechanism RCE
漏洞描述
中文描述:
(暂无数据)
英文描述:
GoSign Desktop versions 2.4.0 and earlier use an unsigned update manifest for distributing application updates. The manifest contains package URLs and SHA-256 hashes but is not digitally signed, so its authenticity relies solely on the underlying TLS channel. In affected versions, TLS certificate validation can be disabled when a proxy is configured, allowing an attacker who can intercept network traffic to supply a malicious update manifest and corresponding package with a matching hash. This can cause the client to download and install a tampered update, resulting in arbitrary code execution with the privileges of the GoSign Desktop user on Windows and macOS, or with elevated privileges on some Linux deployments. A local attacker who can modify proxy settings may also abuse this behavior to escalate privileges by forcing installation of a crafted update.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Tinexta InfoCert S.p.A. | GoSign Desktop | - | < 2.4.1 | - |
cpe:2.3:a:tinexta_infocert_s.p.a.:gosign_desktop:*:*:*:*:*:*:*:*
|
| infocert | gosign | * | - | - |
cpe:2.3:a:infocert:gosign:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
4.0 (cna)
HIGHCVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-34324 |
2025-11-19 04:05:44 | 2026-01-12 02:11:32 |
| NVD | nvd_CVE-2025-34324 |
2026-01-01 04:27:55 | 2026-01-12 02:27:39 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']