Refine your search

2 vulnerabilities found for SANUPS SOFTWARE STANDALONE by SANYO DENKI CO., LTD.

jvndb-2026-000041
Vulnerability from jvndb
Published
2026-03-25 17:58
Modified
2026-03-25 17:58
Severity ?
Summary
SANYO DENKI SANUPS SOFTWARE registers Windows services with unquoted file paths
Details
SANUPS SOFTWARE provided by SANYO DENKI CO., LTD. contains the following vulnerability.<a href='https://cwe.mitre.org/data/definitions/428.html' target='_blank'></a><ul><li>Unquoted search path or element (CWE-428) - CVE-2026-33253</li></ul>Kazuma Matsumoto of GMO Cybersecurity by IERAE, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-000041.html",
  "dc:date": "2026-03-25T17:58+09:00",
  "dcterms:issued": "2026-03-25T17:58+09:00",
  "dcterms:modified": "2026-03-25T17:58+09:00",
  "description": "SANUPS SOFTWARE provided by SANYO DENKI CO., LTD. contains the following vulnerability.\u003ca href=\u0027https://cwe.mitre.org/data/definitions/428.html\u0027 target=\u0027_blank\u0027\u003e\u003c/a\u003e\u003cul\u003e\u003cli\u003eUnquoted search path or element (CWE-428) - CVE-2026-33253\u003c/li\u003e\u003c/ul\u003eKazuma Matsumoto of GMO Cybersecurity by IERAE, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-000041.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:misc:sanyo_denki_sanups_software",
      "@product": "SANUPS SOFTWARE",
      "@vendor": "SANYO DENKI CO., LTD.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:misc:sanyo_denki_sanups_software_standalone",
      "@product": "SANUPS SOFTWARE STANDALONE",
      "@vendor": "SANYO DENKI CO., LTD.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "6.7",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
    "@version": "3.0"
  },
  "sec:identifier": "JVNDB-2026-000041",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN90835713/index.html",
      "@id": "JVN#90835713",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-33253",
      "@id": "CVE-2026-33253",
      "@source": "CVE"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "SANYO DENKI SANUPS SOFTWARE registers Windows services with unquoted file paths"
}

CVE-2026-33253 (GCVE-0-2026-33253)
Vulnerability from cvelistv5
Published
2026-03-25 05:11
Modified
2026-03-25 13:28
CWE
  • CWE-428 - Unquoted search path or element
Summary
SANUPS SOFTWARE provided by SANYO DENKI CO., LTD. registers Windows services with unquoted file paths. A user with the write permission on the root directory of the system drive may execute arbitrary code with SYSTEM privilege.
Impacted products
Vendor Product Version
SANYO DENKI CO., LTD. SANUPS SOFTWARE STANDALONE Version: Ver.1.0.1 to Ver.1.1.4
Create a notification for this product.
   SANYO DENKI CO., LTD. SANUPS SOFTWARE Version: Ver.2.0.0 to Ver.2.0.2
Version: Ver.1.0.0 to Ver.1.1.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-33253",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-25T13:28:18.919558Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-25T13:28:29.422Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SANUPS SOFTWARE STANDALONE",
          "vendor": "SANYO DENKI CO., LTD.",
          "versions": [
            {
              "status": "affected",
              "version": "Ver.1.0.1 to Ver.1.1.4"
            }
          ]
        },
        {
          "product": "SANUPS SOFTWARE",
          "vendor": "SANYO DENKI CO., LTD.",
          "versions": [
            {
              "status": "affected",
              "version": "Ver.2.0.0 to Ver.2.0.2"
            },
            {
              "status": "affected",
              "version": "Ver.1.0.0 to Ver.1.1.4"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SANUPS SOFTWARE provided by SANYO DENKI CO., LTD. registers Windows services with unquoted file paths. A user with the write permission on the root directory of the system drive may execute arbitrary code with SYSTEM privilege."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en-US",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en-US",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-428",
              "description": "Unquoted search path or element",
              "lang": "en-US",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-25T05:11:53.688Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://products.sanyodenki.com/media/document/sanups/H0033449_en.pdf"
        },
        {
          "url": "https://products.sanyodenki.com/media/document/sanups/H0033413_jp.pdf"
        },
        {
          "url": "https://jvn.jp/en/jp/JVN90835713/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2026-33253",
    "datePublished": "2026-03-25T05:11:53.688Z",
    "dateReserved": "2026-03-18T08:17:06.156Z",
    "dateUpdated": "2026-03-25T13:28:29.422Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}