Cain & Abel 4.9.56 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated privileges. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with LocalSystem permissions.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/50728 | Exploit |
| https://www.malavida.com/en/soft/cain-and-abel | Broken Link |
| https://www.vulncheck.com/advisories/cain-abel-unquoted-service-path | Third Party Advisory |
| https://www.exploit-db.com/exploits/50728 | Exploit |
Configurations
History
No history.
Information
Published : 2026-01-13 23:15
Updated : 2026-02-02 16:16
NVD link : CVE-2022-50933
Mitre link : CVE-2022-50933
CVE.ORG link : CVE-2022-50933
JSON object : View
Products Affected
malavida
- cain_\&_abel
CWE
CWE-428
Unquoted Search Path or Element
