{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T01:13:55.660","vulnerabilities":[{"cve":{"id":"CVE-2024-3460","sourceIdentifier":"cvd@cert.pl","published":"2024-05-14T15:41:12.850","lastModified":"2025-02-12T15:36:15.813","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In KioWare for Windows (versions all through 8.34) it is possible to exit this software and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs. \nIn order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know the PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.\n\n"},{"lang":"es","value":"En KioWare para Windows (versiones hasta 8.34) es posible salir de este software y utilizar otras aplicaciones ya abiertas utilizando un breve período de tiempo antes de que se produzca el cierre de sesión automático forzado. Luego, utilizando alguna función integrada de estas aplicaciones, se pueden iniciar otros programas. Para aprovechar esta vulnerabilidad, las aplicaciones externas deben dejarse en ejecución cuando se inicia el software KioWare. Además, un atacante debe conocer el PIN establecido para esta instancia de Kioware y también ralentizar la aplicación con alguna tarea específica que extienda la ventana de tiempo utilizable."}],"metrics":{"cvssMetricV31":[{"source":"cvd@cert.pl","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.4,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":5.9}]},"weaknesses":[{"source":"cvd@cert.pl","type":"Secondary","description":[{"lang":"en","value":"CWE-424"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*","versionEndIncluding":"8.34","matchCriteriaId":"08120DB6-BEF8-4C1E-B969-3F661CB25C70"}]}]}],"references":[{"url":"https://cert.pl/en/posts/2024/04/CVE-2024-3459","source":"cvd@cert.pl","tags":["Broken Link","Third Party Advisory"]},{"url":"https://cert.pl/posts/2024/04/CVE-2024-3459","source":"cvd@cert.pl","tags":["Broken Link","Third Party Advisory"]},{"url":"https://www.kioware.com/","source":"cvd@cert.pl","tags":["Product"]},{"url":"https://cert.pl/en/posts/2024/04/CVE-2024-3459","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"]},{"url":"https://cert.pl/posts/2024/04/CVE-2024-3459","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"]},{"url":"https://www.kioware.com/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}