NiceHash QuickMiner 6.12.0 perform software updates over HTTP without validating digital signatures or hash checks. An attacker capable of intercepting or redirecting traffic to the update url and can hijack the update process and deliver arbitrary executables that are automatically executed, resulting in full remote code execution. This constitutes a critical supply chain attack vector.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nicehash:quickminer:6.12.0:*:*:*:*:*:*:* |
Fri, 03 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-494 | |
| Metrics |
cvssV3_1
|
Thu, 02 Oct 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nicehash
Nicehash quickminer |
|
| Vendors & Products |
Nicehash
Nicehash quickminer |
Tue, 30 Sep 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NiceHash QuickMiner 6.12.0 perform software updates over HTTP without validating digital signatures or hash checks. An attacker capable of intercepting or redirecting traffic to the update url and can hijack the update process and deliver arbitrary executables that are automatically executed, resulting in full remote code execution. This constitutes a critical supply chain attack vector. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-09-30T00:00:00.000Z
Updated: 2025-10-03T19:11:22.111Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-56513
Updated: 2025-10-03T19:11:14.412Z
Status : Analyzed
Published: 2025-09-30T18:15:50.440
Modified: 2025-10-15T18:39:09.800
Link: CVE-2025-56513
No data.