Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30896: Uncontrolled Search Path Element in Qsee Qsee Client

0
High
VulnerabilityCVE-2026-30896cvecve-2026-30896
Published: Mon Mar 09 2026 (03/09/2026, 05:01:16 UTC)
Source: CVE Database V5
Vendor/Project: Qsee
Product: Qsee Client

Description

CVE-2026-30896 is a high-severity vulnerability in Qsee Client versions 1. 0. 1 and earlier, involving insecure DLL loading by the installer. An attacker who can trick a user into placing a malicious DLL in the installer's directory and then running the installer can achieve arbitrary code execution with administrative privileges. Exploitation requires local access and user interaction but no prior authentication. This vulnerability impacts confidentiality, integrity, and availability due to the high privileges granted upon exploitation. No known exploits are currently reported in the wild. Organizations using Qsee Client should prioritize patching or mitigating this issue to prevent potential privilege escalation attacks. Countries with significant use of Qsee products and higher risk of targeted attacks should be especially vigilant.

AI-Powered Analysis

AILast updated: 03/09/2026, 05:37:10 UTC

Technical Analysis

CVE-2026-30896 is a vulnerability in the Qsee Client installer (versions 1.0.1 and prior) caused by an uncontrolled search path element when loading Dynamic Link Libraries (DLLs). The installer insecurely loads DLLs without validating their origin or path, allowing an attacker to place a malicious DLL in the installer's directory. When the installer is executed, it loads the malicious DLL, resulting in arbitrary code execution with administrative privileges. This attack requires that the attacker have the ability to place files in the install directory and that a user runs the installer, implying local access and user interaction are necessary. The vulnerability affects the confidentiality, integrity, and availability of the affected system because the attacker gains full administrative control. The CVSS v3.0 base score is 7.8, reflecting high severity due to the potential impact and ease of exploitation once local access is obtained. No patches or exploit code are currently publicly available, and no known exploits have been reported in the wild. The vulnerability stems from improper DLL search path handling, a common security weakness that can be mitigated by secure coding practices such as specifying full DLL paths or using safe DLL loading functions.

Potential Impact

If exploited, this vulnerability allows an attacker to execute arbitrary code with administrative privileges on affected systems, leading to complete system compromise. This can result in unauthorized access to sensitive data, installation of persistent malware, disruption of system operations, and potential lateral movement within a network. Organizations relying on Qsee Client for security or surveillance purposes may face significant operational risks, including data breaches and loss of system integrity. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in environments where attackers can gain physical or remote desktop access. The high privilege level gained amplifies the potential damage, making this a critical concern for enterprise environments and critical infrastructure sectors using Qsee products.

Mitigation Recommendations

Organizations should immediately verify if they are running Qsee Client version 1.0.1 or earlier and plan to upgrade to a patched version once available. Until a patch is released, mitigate risk by restricting write permissions to the install directory to trusted administrators only, preventing unauthorized DLL placement. Educate users to avoid running installers from untrusted sources or directories. Employ application whitelisting and endpoint protection solutions that can detect or block unauthorized DLL loading or suspicious installer behavior. Additionally, monitor systems for unusual administrative activity and maintain strict access controls to limit local user privileges. Vendors should be urged to release a secure update that properly validates DLL paths or uses secure DLL loading APIs to eliminate this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2026-03-06T07:44:54.156Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69ae59252904315ca3ba53ad

Added to database: 3/9/2026, 5:22:45 AM

Last enriched: 3/9/2026, 5:37:10 AM

Last updated: 3/9/2026, 7:14:30 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses