NiceHash QuickMiner 6.12.0 perform software updates over...
Critical severity
Unreviewed
Published
Sep 30, 2025
to the GitHub Advisory Database
•
Updated Oct 3, 2025
Description
Published by the National Vulnerability Database
Sep 30, 2025
Published to the GitHub Advisory Database
Sep 30, 2025
Last updated
Oct 3, 2025
NiceHash QuickMiner 6.12.0 perform software updates over HTTP without validating digital signatures or hash checks. An attacker capable of intercepting or redirecting traffic to the update url and can hijack the update process and deliver arbitrary executables that are automatically executed, resulting in full remote code execution. This constitutes a critical supply chain attack vector.
References