CVE-2026-30896
DLL Hijacking in Qsee Client Installer Allows Privileged Code Execution
Publication date: 2026-03-09
Last updated on: 2026-03-10
Assigner: JPCERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| q-see | qsee_client | to 1.0.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The developer has ceased product development and recommends users stop using Qsee Client to mitigate the risk.
Avoid running the installer for Qsee Client versions 1.0.1 and earlier, especially from untrusted sources.
Ensure that no untrusted DLL files are placed in the same directory as the installer to prevent arbitrary code execution.
Consider removing or uninstalling affected versions of Qsee Client from your systems.
Can you explain this vulnerability to me?
The vulnerability affects the installer for Qsee Client versions 1.0.1 and earlier. It involves an insecure method of loading Dynamic Link Libraries (DLLs), where the installer searches for DLLs in an uncontrolled manner. If a malicious DLL is placed in the same directory as the installer and the installer is executed, this can lead to arbitrary code execution with administrative privileges.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute arbitrary code on your system with administrative privileges if you run the affected installer from a directory containing a malicious DLL. This means the attacker could potentially take full control of your system, leading to severe security risks such as data theft, system compromise, or further malware installation.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "The vulnerability affects the installer for Qsee Client versions 1.0.1 and prior, specifically due to insecure DLL loading when a malicious DLL is placed in the installer's directory."}, {'type': 'paragraph', 'content': 'Detection involves verifying if the Qsee Client version 1.0.1 or earlier is installed on the system.'}, {'type': 'paragraph', 'content': "Since the vulnerability is related to DLL loading during installation, monitoring for unexpected DLL files in the installer's directory or suspicious execution of the installer with administrative privileges may help detect exploitation attempts."}, {'type': 'paragraph', 'content': 'No specific commands or automated detection tools are provided in the available information.'}] [2]