Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-22002: n/a

0
High
VulnerabilityCVE-2024-22002cvecve-2024-22002
Published: Tue Jun 18 2024 (06/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CORSAIR iCUE 5.9.105 with iCUE Murals on Windows allows unprivileged users to insert DLL files in the cuepkg-1.2.6 subdirectory of the installation directory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:08:19 UTC

Technical Analysis

CVE-2024-22002 is a vulnerability identified in CORSAIR iCUE version 5.9.105, specifically involving the iCUE Murals feature on Windows platforms. The flaw allows unprivileged local users to insert arbitrary DLL files into the cuepkg-1.2.6 subdirectory within the installation directory. This insertion capability can lead to DLL hijacking or injection attacks, enabling the attacker to execute arbitrary code with elevated privileges. The vulnerability arises from insufficient access controls on the installation directory's subfolders, permitting unauthorized write operations by non-administrative users. The CVSS v3.1 base score is 7.8, reflecting high severity due to the combination of local attack vector, low attack complexity, required privileges, and no user interaction. The impact includes potential full compromise of confidentiality, integrity, and availability of affected systems. Although no public exploits have been reported yet, the vulnerability represents a significant risk, especially in environments where multiple users share a system or where local access can be gained through other means. The CWE classification is CWE-200 (Exposure of Sensitive Information), indicating that the vulnerability may also allow unauthorized disclosure of information through DLL manipulation. The lack of available patches at the time of publication necessitates immediate attention to mitigation strategies.

Potential Impact

The vulnerability allows local attackers to execute arbitrary code with elevated privileges by injecting malicious DLLs into the CORSAIR iCUE installation directory. This can lead to full system compromise, including unauthorized access to sensitive data, modification or destruction of system files, and disruption of system availability. Organizations using CORSAIR iCUE software on Windows, particularly in multi-user environments or shared systems, face increased risk of insider threats or lateral movement by attackers who gain local access. The high severity score reflects the broad impact on confidentiality, integrity, and availability. Although exploitation requires local access, the ease of DLL injection and lack of user interaction make it a potent vector for privilege escalation and persistence. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability is likely to attract attacker interest due to the popularity of CORSAIR products among gamers and professionals. Failure to address this vulnerability could result in targeted attacks against organizations relying on CORSAIR iCUE for device management and customization.

Mitigation Recommendations

1. Immediately restrict write permissions on the cuepkg-1.2.6 subdirectory and the entire CORSAIR iCUE installation directory to administrative users only, preventing unprivileged users from inserting DLL files. 2. Monitor the installation directory for unauthorized file changes or additions, using file integrity monitoring tools to detect suspicious DLL insertions. 3. Isolate systems running CORSAIR iCUE to minimize local access by untrusted users, especially in shared or multi-user environments. 4. Employ application whitelisting to prevent execution of unauthorized DLLs or code within the iCUE context. 5. Regularly check for and apply official patches or updates from CORSAIR once available to remediate the vulnerability. 6. Educate users about the risks of local privilege escalation and enforce strict local user account management policies. 7. Consider temporarily uninstalling or disabling the iCUE Murals feature if it is not essential, reducing the attack surface until a patch is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d49b7ef31ef0b56ffb5

Added to database: 2/25/2026, 9:44:41 PM

Last enriched: 2/28/2026, 9:08:19 AM

Last updated: 4/12/2026, 9:21:20 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses