kioware CVE Vulnerabilities & Metrics

Focus on kioware vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About kioware Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with kioware. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total kioware CVEs: 7
Earliest CVE date: 21 Mar 2019, 16:00 UTC
Latest CVE date: 14 May 2024, 15:41 UTC

Latest CVE reference: CVE-2024-3461

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 3

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 50.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 50.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical kioware CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.03

Max CVSS: 7.2

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 6
4.0-6.9 0
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS kioware CVEs

These are the five CVEs with the highest CVSS scores for kioware, sorted by severity first and recency.

All CVEs for kioware

CVE-2024-3461 kioware vulnerability CVSS: 0 14 May 2024, 15:41 UTC

KioWare for Windows (versions all through 8.35) allows to brute force the PIN number, which protects the application from being closed, as there are no mechanisms preventing a user from excessively guessing the number.

CVE-2024-3460 kioware vulnerability CVSS: 0 14 May 2024, 15:41 UTC

In KioWare for Windows (versions all through 8.34) it is possible to exit this software and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs.  In order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know the PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.

CVE-2024-3459 kioware vulnerability CVSS: 0 14 May 2024, 15:41 UTC

KioWare for Windows (versions all through 8.34) allows to escape the environment by downloading PDF files, which then by default are opened in an external PDF viewer. By using built-in functions of that viewer it is possible to launch a web browser, search through local files and, subsequently, launch any program with user privileges.

CVE-2023-34642 kioware vulnerability CVSS: 0 19 Jun 2023, 05:15 UTC

KioWare for Windows through v8.33 was discovered to contain an incomplete blacklist filter for blocked dialog boxes on Windows 10. This issue can allow attackers to open a file dialog box via the function showDirectoryPicker() which can then be used to open an unprivileged command prompt.

CVE-2023-34641 kioware vulnerability CVSS: 0 19 Jun 2023, 05:15 UTC

KioWare for Windows through v8.33 was discovered to contain an incomplete blacklist filter for blocked dialog boxes on Windows 10. This issue can allow attackers to open a file dialog box via the function window.print() which can then be used to open an unprivileged command prompt.

CVE-2022-44875 kioware vulnerability CVSS: 0 06 Mar 2023, 05:15 UTC

KioWare through 8.33 on Windows sets KioScriptingUrlACL.AclActions.AllowHigh for the about:blank origin, which allows attackers to obtain SYSTEM access via KioUtils.Execute in JavaScript code.

CVE-2018-18435 kioware vulnerability CVSS: 7.2 21 Mar 2019, 16:00 UTC

KioWare Server version 4.9.6 and older installs by default to "C:\kioware_com" with weak folder permissions granting any user full permission "Everyone: (F)" to the contents of the directory and it's sub-folders. In addition, the program installs a service called "KWSService" which runs as "Localsystem", this will allow any user to escalate privileges to "NT AUTHORITY\SYSTEM" by substituting the service's binary with a malicious one.