Search for vulnerabilities
Vulnerability details: VCID-kcty-b5k2-aaah
Vulnerability ID VCID-kcty-b5k2-aaah
Aliases CVE-2018-1000006
GHSA-w222-53c6-c86p
Summary Remote Code Execution (Windows) GitHub Electron has a vulnerability in the protocol handler.
Status Published
Exploitability 2.0
Weighted Severity 8.4
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.93156 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.96817 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.96817 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.96817 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.96817 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.97033 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.97033 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.97033 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.97033 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.97033 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
epss 0.97033 https://api.first.org/data/v1/epss?cve=CVE-2018-1000006
cvssv3.1 8.8 https://electronjs.org/blog/protocol-handler-fix
generic_textual HIGH https://electronjs.org/blog/protocol-handler-fix
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-w222-53c6-c86p
cvssv3.1 8.8 https://github.com/electron/electron/releases/tag/v1.8.2-beta.4
generic_textual HIGH https://github.com/electron/electron/releases/tag/v1.8.2-beta.4
cvssv3.1 8.8 https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374
generic_textual HIGH https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2018-1000006
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2018-1000006
cvssv3.1 8.8 https://www.exploit-db.com/exploits/43899
generic_textual HIGH https://www.exploit-db.com/exploits/43899
cvssv3.1 8.8 https://www.exploit-db.com/exploits/44357
generic_textual HIGH https://www.exploit-db.com/exploits/44357
cvssv3.1 8.8 https://www.npmjs.com/advisories/563
generic_textual HIGH https://www.npmjs.com/advisories/563
cvssv3.1 8.8 http://www.securityfocus.com/bid/102796
generic_textual HIGH http://www.securityfocus.com/bid/102796
Data source Exploit-DB
Date added March 29, 2018
Description Exodus Wallet (ElectronJS Framework) - Remote Code Execution (Metasploit)
Ransomware campaign use Known
Source publication date March 29, 2018
Exploit type remote
Platform windows
Source update date March 29, 2018
Source URL https://raw.githubusercontent.com/rapid7/metasploit-framework/0a0bef0c4fc52c418782015b1b49daf067ce964c/modules/exploits/windows/browser/exodus.rb
Data source Metasploit
Description This module exploits a Remote Code Execution vulnerability in Exodus Wallet, a vulnerability in the ElectronJS Framework protocol handler can be used to get arbitrary command execution if the user clicks on a specially crafted URL.
Note
{}
Ransomware campaign use Unknown
Source publication date Jan. 25, 2018
Platform Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/browser/exodus.rb
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://electronjs.org/blog/protocol-handler-fix
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/electron/electron/releases/tag/v1.8.2-beta.4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2018-1000006
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-1000006
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/43899
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/44357
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.npmjs.com/advisories/563
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.securityfocus.com/bid/102796
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.9979
EPSS Score 0.93156
Published At March 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.