Sploit.io - Search

Product: K-System WellComm, version: 1.1, 4.0

CVE-2020-7873

Severity: HIGH

Description: Download of code without integrity check vulnerability in ActiveX control of Younglimwon Co., Ltd allows the attacker to cause a arbitrary file download and execution.

CVSS Score: 8.8

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.002330000
  • Percentile: 0.459960000
  • Date: 2026-01-06

ExploitDB

No data available.

HackerOne Data

  • Rank: 8551
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Younglimwon Co., Ltd K-System WellComm - Versions: 1.1, 4.0

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2020-7873, is a “Download of Code Without Integrity Check” affecting Younglimwon Co., Ltd’s K-System WellComm software versions 1.1 and 4.0. This means that the ActiveX control within the software downloads code without verifying its authenticity, making it susceptible to malicious code execution. The CVSS score of 8.8 (HIGH) indicates a significant risk. The vulnerability requires user interaction – likely clicking a specially crafted link or visiting a malicious webpage utilizing the vulnerable ActiveX control – making exploitation somewhat reliant on social engineering. However, once exploited, the impact is high across Confidentiality, Integrity, and Availability. Attackers could potentially download and execute arbitrary code on the affected system, leading to data breaches, system compromise, or denial-of-service. The business impact could range from data loss and service disruption to reputational damage and financial losses, depending on the sensitivity of the data processed by K-System WellComm. The EPSS score of 0.002330000 suggests a relatively low, but still present, likelihood of exploitation in the wild.

    2. Potential Attack Scenarios
    An attacker could create a malicious webpage hosting a specially crafted HTML document that utilizes the vulnerable ActiveX control. A user browsing this webpage with a browser configured to allow the ActiveX control to run will trigger the download of the malicious code. The attacker could embed a payload that downloads and executes a ransomware variant, encrypting critical files on the affected system. Alternatively, the attacker could download a backdoor, providing persistent access to the system for data exfiltration or further malicious activities. The attack vector is network-based, initiated via a webpage. The attack process involves the user interacting with the webpage, triggering the download of the malicious code, and finally, the execution of that code on the system. The potential outcome is complete system compromise, data loss, and potential lateral movement within the network.

    3. Mitigation Recommendations
    The primary mitigation is to upgrade K-System WellComm to a version that addresses the vulnerability. Younglimwon Co., Ltd should be contacted directly for the latest version. In the interim, if upgrading immediately is not possible, the following steps can be taken:

    * Minimize user interaction with the ActiveX control: If possible, restrict which users have access to the K-System WellComm software or the specific functionality utilizing the vulnerable control.
    * Implement robust web filtering: Block access to potentially malicious websites that may utilize the vulnerable ActiveX control.
    * Enable strict ActiveX control settings: Configure Internet Explorer (or the browser used with the software) to prompt users before running ActiveX controls, giving them the opportunity to approve or deny execution.
    * Monitor network traffic: Look for unusual outbound connections from affected systems that may indicate malicious code execution.
    * Regularly scan for vulnerabilities: Conduct periodic vulnerability scans to identify and address other potential weaknesses in the environment.
    * Reference: https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36233 provides more details from the original advisory.

    4. Executive Summary
    CVE-2020-7873 is a HIGH severity vulnerability in Younglimwon Co., Ltd’s K-System WellComm software that could allow attackers to download and execute arbitrary code on affected systems. This poses a significant risk to the confidentiality, integrity, and availability of data and services. The vulnerability requires user interaction, but the potential impact of successful exploitation is substantial, ranging from data breaches to complete system compromise. We recommend prioritizing patching K-System WellComm to the latest version as the primary mitigation. In the meantime, implementing additional security measures like web filtering and strict ActiveX control settings can help reduce the risk. Prompt action is crucial to protect our systems and data from potential malicious activity and minimize business disruption. Ignoring this vulnerability could lead to significant financial and reputational damage.