CVE-2023-29059

Summary

CVECVE-2023-29059
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-03-30 17:15:00 UTC
Updated2023-04-10 16:29:00 UTC
Description3CX DesktopApp through 18.12.416 has embedded malicious code, as exploited in the wild in March 2023. This affects versions 18.12.407 and 18.12.416 of the 3CX DesktopApp Electron Windows application shipped in Update 7, and versions 18.11.1213, 18.12.402, 18.12.407, and 18.12.416 of the 3CX DesktopApp Electron macOS application.

Risk And Classification

Problem Types: NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application 3cx 3cx 18.11.1213 All All All
Application 3cx 3cx 18.12.402 All All All
Application 3cx 3cx 18.12.407 All All All
Application 3cx 3cx 18.12.407 All All All
Application 3cx 3cx 18.12.416 All All All
Application 3cx 3cx 18.12.416 All All All

References

ReferenceSourceLinkTags
CWE - CWE-506: Embedded Malicious Code (4.8) MISC cwe.mitre.org
3CX VoIP Software Compromise & Supply Chain Threats MISC www.huntress.com
Update 2: 3CX users under DLL-sideloading attack: What you need to know – Sophos News MISC news.sophos.com Exploit, Technical Description, Third Party Advisory
3CX Security Alert for Electron Windows App | Desktop App MISC www.3cx.com
3CX Desktop App Compromised (CVE-2023-29059) | FortiGuard Labs MISC www.fortinet.com
CrowdStrike Prevents 3CXDesktopApp Intrusion Campaign MISC www.crowdstrike.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 378327 3CX Desktop Client Supply Chain Vulnerability
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report