changingtec CVE Vulnerabilities & Metrics

Focus on changingtec vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About changingtec Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with changingtec. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total changingtec CVEs: 19
Earliest CVE date: 03 Feb 2020, 11:15 UTC
Latest CVE date: 02 Aug 2024, 11:16 UTC

Latest CVE reference: CVE-2024-40723

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 5

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 400.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 400.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical changingtec CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.35

Max CVSS: 9.3

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 16
4.0-6.9 0
7.0-8.9 2
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS changingtec CVEs

These are the five CVEs with the highest CVSS scores for changingtec, sorted by severity first and recency.

All CVEs for changingtec

CVE-2024-40723 changingtec vulnerability CVSS: 0 02 Aug 2024, 11:16 UTC

The specific API in HWATAIServiSign Windows Version from CHANGING Information Technology does not properly validate the length of server-side inputs. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the HWATAIServiSign, temporarily disrupting its service.

CVE-2024-40722 changingtec vulnerability CVSS: 0 02 Aug 2024, 11:16 UTC

The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the TCBServiSign, temporarily disrupting its service.

CVE-2024-40721 changingtec vulnerability CVSS: 0 02 Aug 2024, 11:16 UTC

The specific API in TCBServiSign Windows Version from CHANGING Information Technology does not properly validate server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause the TCBServiSign to load a DLL from an arbitrary path.

CVE-2024-40720 changingtec vulnerability CVSS: 0 02 Aug 2024, 11:16 UTC

The specific API in TCBServiSign Windows Version from CHANGING Information Technology does not properly validate server-side input. When a user visits a spoofed website, unauthenticated remote attackers can modify the `HKEY_CURRENT_USER` registry to execute arbitrary commands.

CVE-2024-40719 changingtec vulnerability CVSS: 0 02 Aug 2024, 10:16 UTC

The encryption strength of the authorization keys in CHANGING Information Technology TCBServiSign Windows Version is insufficient. When a remote attacker tricks a victim into visiting a malicious website, TCBServiSign will treat that website as a legitimate server and interact with it.

CVE-2023-22901 changingtec vulnerability CVSS: 0 27 Apr 2023, 02:15 UTC

ChangingTec MOTP system has a path traversal vulnerability. A remote attacker with administrator’s privilege can exploit this vulnerability to access arbitrary system files.

CVE-2022-39061 changingtec vulnerability CVSS: 0 31 Jan 2023, 08:15 UTC

ChangingTech MegaServiSignAdapter component has a vulnerability of Out-of-bounds Read due to insufficient validation for parameter length. An unauthenticated remote attacker can exploit this vulnerability to access partial sensitive content in memory and disrupts partial services.

CVE-2022-39060 changingtec vulnerability CVSS: 0 31 Jan 2023, 08:15 UTC

ChangingTech MegaServiSignAdapter component has a vulnerability of improper input validation. An unauthenticated remote attacker can exploit this vulnerability to access and modify HKEY_CURRENT_USER subkey (ex: AutoRUN) in Registry where malicious scripts can be executed to take control of the system or to terminate the service.

CVE-2022-39059 changingtec vulnerability CVSS: 0 31 Jan 2023, 08:15 UTC

ChangingTech MegaServiSignAdapter component has a path traversal vulnerability within its file reading function. An unauthenticated remote attacker can exploit this vulnerability to access arbitrary system files.

CVE-2022-46306 changingtec vulnerability CVSS: 0 03 Jan 2023, 03:15 UTC

ChangingTec ServiSign component has a path traversal vulnerability due to insufficient filtering for special characters in the DLL file path. An unauthenticated remote attacker can host a malicious website for the component user to access, which triggers the component to load malicious DLL files under arbitrary file path and allows the attacker to perform arbitrary system operation and disrupt of service.

CVE-2022-46305 changingtec vulnerability CVSS: 0 03 Jan 2023, 03:15 UTC

ChangingTec ServiSign component has a path traversal vulnerability. An unauthenticated LAN attacker can exploit this vulnerability to bypass authentication and access arbitrary system files.

CVE-2022-46304 changingtec vulnerability CVSS: 0 03 Jan 2023, 03:15 UTC

ChangingTec ServiSign component has insufficient filtering for special characters in the connection response parameter. An unauthenticated remote attacker can host a malicious website for the component user to access, which triggers command injection and allows the attacker to execute arbitrary system command to perform arbitrary system operation or disrupt service.

CVE-2022-39058 changingtec vulnerability CVSS: 0 18 Oct 2022, 06:15 UTC

RAVA certification validation system has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and access arbitrary system files.

CVE-2022-39057 changingtec vulnerability CVSS: 0 18 Oct 2022, 06:15 UTC

RAVA certificate validation system has insufficient filtering for special parameter of the web page input field. A remote attacker with administrator privilege can exploit this vulnerability to perform arbitrary system command and disrupt service.

CVE-2022-39056 changingtec vulnerability CVSS: 0 18 Oct 2022, 06:15 UTC

RAVA certificate validation system has insufficient validation for user input. An unauthenticated remote attacker can inject arbitrary SQL command to access, modify and delete database.

CVE-2022-39055 changingtec vulnerability CVSS: 0 18 Oct 2022, 06:15 UTC

RAVA certificate validation system has inadequate filtering for URL parameter. An unauthenticated remote attacker can perform SSRF attack to discover internal network topology base on query response.

CVE-2020-3927 changingtec vulnerability CVSS: 8.5 03 Feb 2020, 11:15 UTC

An arbitrary-file-access vulnerability exists in ServiSign security plugin, as long as the attackers learn the specific API function, they may access arbitrary files on target system via crafted API parameter.

CVE-2020-3926 changingtec vulnerability CVSS: 7.8 03 Feb 2020, 11:15 UTC

An arbitrary-file-access vulnerability exists in ServiSign security plugin, as long as the attackers learn the specific API function, they may access arbitrary files on target system via crafted API parameter.

CVE-2020-3925 changingtec vulnerability CVSS: 9.3 03 Feb 2020, 11:15 UTC

A Remote Code Execution(RCE) vulnerability exists in some designated applications in ServiSign security plugin, as long as the interface is captured, attackers are able to launch RCE and executes arbitrary command on target system via malicious crafted scripts.