Refine your search
2 vulnerabilities found for Fujitsu Security Solution AuthConductor Client Basic V2 by Fujitsu Client Computing Limited
jvndb-2026-000001
Vulnerability from jvndb
Published
2026-01-07 14:19
Modified
2026-01-07 14:19
Severity ?
Summary
Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2
Details
Fujitsu Security Solution AuthConductor Client Basic V2 provided by Fujitsu Client Computing Limited contains the following vulnerability.
<ul><li>Origin validation error (CWE-346) - CVE-2026-20893</li></ul>MASAHIRO IIDA of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | |
|---|---|---|
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-000001.html",
"dc:date": "2026-01-07T14:19+09:00",
"dcterms:issued": "2026-01-07T14:19+09:00",
"dcterms:modified": "2026-01-07T14:19+09:00",
"description": "Fujitsu Security Solution AuthConductor Client Basic V2 provided by Fujitsu Client Computing Limited contains the following vulnerability.\r\n\u003cul\u003e\u003cli\u003eOrigin validation error (CWE-346) - CVE-2026-20893\u003c/li\u003e\u003c/ul\u003eMASAHIRO IIDA of LAC Co., Ltd. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-000001.html",
"sec:cpe": {
"#text": "cpe:/a:misc:fujitsuclientcomputing_fujitsusecuritysolutionauthconductorclientbasicv2",
"@product": "Fujitsu Security Solution AuthConductor Client Basic V2",
"@vendor": "Fujitsu Client Computing Limited",
"@version": "2.2"
},
"sec:cvss": {
"@score": "7.8",
"@severity": "High",
"@type": "Base",
"@vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
},
"sec:identifier": "JVNDB-2026-000001",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN24626628/index.html",
"@id": "JVN#24626628",
"@source": "JVN"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20893",
"@id": "CVE-2026-20893",
"@source": "CVE"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2"
}
CVE-2026-20893 (GCVE-0-2026-20893)
Vulnerability from cvelistv5
Published
2026-01-07 03:16
Modified
2026-01-07 14:38
Severity ?
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.5 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.5 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-346 - Origin validation error
Summary
Origin validation error issue exists in Fujitsu Security Solution AuthConductor Client Basic V2 2.0.25.0 and earlier. If this vulnerability is exploited, an attacker who can log in to the Windows system where the affected product is installed may execute arbitrary code with SYSTEM privilege and/or modify the registry value.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Fujitsu Client Computing Limited | Fujitsu Security Solution AuthConductor Client Basic V2 |
Version: 2.0.25.0 and earlier |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-20893",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-07T14:38:13.907901Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-07T14:38:27.948Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Fujitsu Security Solution AuthConductor Client Basic V2",
"vendor": "Fujitsu Client Computing Limited",
"versions": [
{
"status": "affected",
"version": "2.0.25.0 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Origin validation error issue exists in Fujitsu Security Solution AuthConductor Client Basic V2 2.0.25.0 and earlier. If this vulnerability is exploited, an attacker who can log in to the Windows system where the affected product is installed may execute arbitrary code with SYSTEM privilege and/or modify the registry value."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-346",
"description": "Origin validation error",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-07T03:16:19.093Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.fmworld.net/biz/common/info/202601acc/"
},
{
"url": "https://jvn.jp/en/jp/JVN24626628/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2026-20893",
"datePublished": "2026-01-07T03:16:19.093Z",
"dateReserved": "2025-12-22T02:14:24.139Z",
"dateUpdated": "2026-01-07T14:38:27.948Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}