First published: Fri Apr 09 2021(Updated: )
A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions.
Credit: security@deepsurface.com
Affected Software | Affected Version | How to fix |
---|---|---|
Erlang/OTP | <23.2.3 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29221 is rated as a high severity local privilege escalation vulnerability.
To fix CVE-2021-29221, upgrade Erlang/OTP to version 23.2.3 or later.
CVE-2021-29221 affects all users running Erlang/OTP prior to version 23.2.3.
A local attacker can hijack accounts of other users running Erlang programs or manipulate services using 'erlsrv.exe'.
Yes, CVE-2021-29221 can be present in default installations of Erlang/OTP versions prior to 23.2.3.