CVE-2024-25249
moderate-risk
Published 2024-02-21
An issue in He3 App for macOS version 2.0.17, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
Do I need to act?
~
2.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
He3 App
Affected Vendors
References (6)
Not Applicable
https://github.com/intbjw
Broken Link
https://github.com/intbjw/CVE-2024-25249
Technical Description
https://www.electronjs.org/blog/statement-run-as-node-cves
Not Applicable
https://github.com/intbjw
Broken Link
https://github.com/intbjw/CVE-2024-25249
Technical Description
https://www.electronjs.org/blog/statement-run-as-node-cves
43
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
5/34 · Minimal