Description

WithSecure Elements Endpoint Protection Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of WithSecure Elements Endpoint Protection. User interaction on the part of an administrator is required to exploit this vulnerability. The specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23035.

INFO

Published Date :

2024-05-22T19:13:53.373Z

Last Modified :

2024-08-01T20:40:47.114Z

Source :

zdi
AFFECTED PRODUCTS

The following products are affected by CVE-2024-4454 vulnerability.

Vendors Products
Microsoft
  • Windows
Withsecure
  • Client Security
  • Elements Endpoint Protection
  • Email And Server Security
  • Server Security
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-4454.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact