<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Protocol-Handler — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/protocol-handler/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 18:46:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/protocol-handler/feed.xml" rel="self" type="application/rss+xml"/><item><title>Electerm Arbitrary Code Execution via Crafted URI or CLI Arguments</title><link>https://feed.craftedsignal.io/briefs/2024-05-electerm-code-exec/</link><pubDate>Fri, 08 May 2026 18:46:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-electerm-code-exec/</guid><description>Electerm versions 3.0.6 through 3.8.14 are vulnerable to arbitrary local code execution via crafted electerm:// URIs or command-line arguments, requiring a user to click a malicious link or open a malicious shortcut file.</description><content:encoded><![CDATA[<p>Electerm, a free and open-source terminal/ssh/sftp client, is vulnerable to arbitrary code execution. Versions 3.0.6 through 3.8.14 are susceptible to this vulnerability. An attacker can exploit this by crafting a malicious <code>electerm://</code> URI or by crafting a shortcut/command that launches electerm with attacker-controlled <code>--opts</code> arguments. Successful exploitation requires a user to click the malicious link or open the malicious shortcut file. This vulnerability allows attackers to execute arbitrary code on the victim&rsquo;s machine, potentially leading to system compromise, data theft, or other malicious activities. The vulnerability was reported by Curly-Haired-Baboon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious <code>electerm://</code> URI or a shortcut/command containing malicious <code>--opts</code> arguments.</li>
<li>The attacker distributes the malicious URI or shortcut/command to the victim via social engineering or other means.</li>
<li>The victim clicks on the malicious <code>electerm://</code> URI or opens the malicious shortcut/command.</li>
<li>Electerm is launched with the attacker-controlled parameters.</li>
<li>Due to insufficient validation of the input, the attacker&rsquo;s payload is processed by Electerm.</li>
<li>The attacker&rsquo;s payload executes arbitrary code on the victim&rsquo;s machine.</li>
<li>The attacker gains control of the compromised system, enabling them to perform malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to arbitrary code execution on the victim&rsquo;s machine. This can result in a wide range of malicious activities, including but not limited to, system compromise, data theft, installation of malware, and denial of service. Given the nature of Electerm as a terminal client, attackers could potentially gain access to sensitive credentials and systems managed through the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Electerm to version 3.8.15 or later to patch CVE-2026-43944.</li>
<li>Disable or unregister electerm protocol handlers (Deep Link settings) as a workaround.</li>
<li>Avoid clicking <code>electerm://</code> links from untrusted sources.</li>
<li>Refrain from running electerm with untrusted <code>--opts</code> arguments or opening <code>.lnk</code> / <code>.desktop</code> files from untrusted sources.</li>
<li>Deploy the Sigma rule &ldquo;Detect Electerm URI Protocol Handler Abuse&rdquo; to identify attempts to exploit this vulnerability by monitoring process execution that involves the electerm protocol.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>code-execution</category><category>protocol-handler</category><category>electerm</category></item><item><title>Electerm Arbitrary Protocol Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-07-electerm-rce/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-electerm-rce/</guid><description>Electerm versions 3.8.15 and earlier are vulnerable to arbitrary code execution due to improper validation of URLs, allowing attackers to execute commands by tricking users into clicking malicious links in the terminal.</description><content:encoded><![CDATA[<p>Electerm, a cross-platform terminal application, is vulnerable to an arbitrary protocol execution vulnerability (CVE-2026-43941) in versions 3.8.15 and earlier. This flaw stems from the application&rsquo;s failure to properly validate URLs passed to the <code>shell.openExternal</code> function. An attacker who can control terminal output, such as through a compromised SSH server or a malicious plugin, can inject a crafted URI into the terminal. If a user clicks on this malicious link, Electerm will execute it using the operating system&rsquo;s default protocol handler, potentially leading to code execution, data exfiltration, or other malicious activities. This vulnerability requires user interaction (clicking the link) to be exploited.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises a remote SSH server or injects malicious content into terminal output.</li>
<li>The attacker crafts a malicious URI containing a dangerous protocol handler like <code>ms-msdt:</code>, <code>search-ms:</code>, or <code>file://</code>.</li>
<li>The malicious URI is printed to the Electerm terminal connected to the compromised SSH server.</li>
<li>The victim, using Electerm, views the terminal output containing the malicious URI.</li>
<li>The victim clicks on the malicious URI hyperlink in the Electerm terminal.</li>
<li>Electerm&rsquo;s <code>shell.openExternal</code> function executes the URI without proper validation.</li>
<li>The operating system&rsquo;s default protocol handler is invoked, executing the attacker&rsquo;s payload (e.g., code execution via <code>ms-msdt:</code>, NTLM hash leak via <code>file://</code>).</li>
<li>Attacker achieves arbitrary code execution or exfiltrates sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-43941) could allow an attacker to execute arbitrary code on a victim&rsquo;s machine. This could lead to complete system compromise, data theft, or the installation of malware. The vulnerability affects all Electerm users who interact with untrusted terminal outputs. The number of potential victims is dependent on Electerm&rsquo;s user base. If successfully exploited, an attacker gains the privileges of the user running Electerm.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Electerm Suspicious URI Invocation&rdquo; to detect attempts to exploit CVE-2026-43941 by monitoring process creations with unusual protocol handlers (see rule definition below).</li>
<li>Apply the workaround to disable hyperlink rendering in electerm&rsquo;s terminal settings until a patch is available.</li>
<li>Monitor the electerm GitHub releases and security page for an update addressing this issue.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>terminal</category><category>protocol handler</category></item></channel></rss>