
Cloud Vulnerability DB
A community-led vulnerabilities database
Electron, an open source framework for writing cross-platform desktop applications, has been found to contain a vulnerability related to ASAR Integrity bypass (CVE-2024-46992). The vulnerability affects versions 30.0.0-alpha.1 to before 30.0.5 and 31.0.0-alpha.1 to before 31.0.0-beta.1. This security issue specifically impacts applications that have both the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled (GitHub Advisory).
The vulnerability is an ASAR (Archive) Integrity bypass that specifically affects Windows systems. The issue only manifests when the application is launched from a filesystem where the attacker has write access. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High), with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access required with low attack complexity and no user interaction needed (GitHub Advisory).
If exploited, the vulnerability could lead to high impacts on confidentiality, integrity, and availability of the affected application. The vulnerability specifically bypasses the protection mechanisms that are supposed to prevent modification of files inside the application bundle (GitHub Advisory).
There are no app-side workarounds available for this vulnerability. The only mitigation is to update to the patched versions: Electron 30.0.5 or 31.0.0-beta.1 (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."