Skip to main content

CVE-2024-0771: CWE-119 Memory Corruption in Nsasoft Product Key Explorer

Medium
VulnerabilityCVE-2024-0771cvecve-2024-0771cwe-119
Published: Sun Jan 21 2024 (01/21/2024, 23:00:07 UTC)
Source: CVE
Vendor/Project: Nsasoft
Product: Product Key Explorer

Description

A vulnerability has been found in Nsasoft Product Key Explorer 4.0.9 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Registration Handler. The manipulation of the argument Name/Key leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251671. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/05/2025, 05:39:32 UTC

Technical Analysis

CVE-2024-0771 is a medium-severity memory corruption vulnerability classified under CWE-119, affecting Nsasoft Product Key Explorer version 4.0.9. The flaw resides in an unspecified functionality within the Registration Handler component, where manipulation of the argument Name/Key can lead to memory corruption. This vulnerability requires local access to the affected system, meaning an attacker must have some level of local privileges to exploit it. The vulnerability does not require user interaction but does require low privileges (PR:L) and has low attack complexity (AC:L). The impact includes potential confidentiality, integrity, and availability losses, as memory corruption can lead to arbitrary code execution, data leakage, or application crashes. The vendor has not responded to vulnerability disclosure attempts, and no patches or fixes have been released at the time of publication. Although no known exploits are currently in the wild, the public disclosure of the exploit code increases the risk of exploitation by local attackers. The CVSS v3.1 base score is 5.3, reflecting a medium severity level with local attack vector, low complexity, and partial impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations using Nsasoft Product Key Explorer 4.0.9, this vulnerability poses a moderate risk primarily in environments where local access to systems is possible by untrusted users or where endpoint security is weak. The potential for memory corruption can lead to unauthorized code execution or data manipulation, which could compromise sensitive license key information managed by the software. This is particularly relevant for software asset management teams and IT departments relying on Product Key Explorer for license auditing and compliance. The lack of vendor response and absence of patches increases the window of exposure. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, government) may face additional risks if this vulnerability is exploited to leak or alter licensing data or disrupt asset management processes. However, since exploitation requires local access, remote attacks are not feasible, limiting the threat surface mainly to insider threats or compromised endpoints.

Mitigation Recommendations

1. Restrict local access to systems running Nsasoft Product Key Explorer 4.0.9 to trusted personnel only and enforce strict endpoint security policies. 2. Monitor and audit local user activities on affected systems to detect any suspicious behavior that could indicate exploitation attempts. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous memory corruption or code execution patterns related to the vulnerable component. 4. If possible, isolate systems running this software from less trusted network segments to reduce the risk of lateral movement by attackers with local access. 5. Consider replacing or upgrading Product Key Explorer to a different version or alternative product if available, as no patch has been released and the vendor is unresponsive. 6. Implement strict privilege management to minimize the number of users with local access rights that could exploit this vulnerability. 7. Keep system and security software up to date to reduce the risk of privilege escalation that could facilitate exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-21T09:18:19.455Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd8325

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 5:39:32 AM

Last updated: 8/4/2025, 10:40:30 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats