First published: Mon Jul 18 2022(Updated: )
AnyDesk 7.0.9 allows a local user to gain SYSTEM privileges via a symbolic link because the user can write to their own %APPDATA% folder (used for ad.trace and chat) but the product runs as SYSTEM when writing chat-room data there.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AnyDesk | =7.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-32450 is high.
A local user can gain SYSTEM privileges by exploiting the symbolic link vulnerability in AnyDesk 7.0.9.
AnyDesk 7.0.9 is the affected software version of CVE-2022-32450.
The local user gains SYSTEM privileges by writing to their own %APPDATA% folder, which is used by AnyDesk for ad.trace and chat data, and the product runs as SYSTEM when writing chat-room data there.
Yes, you can find references for CVE-2022-32450 at the following links: [references](http://anydesk.com), [references](http://packetstormsecurity.com/files/167608/AnyDesk-7.0.9-Arbitrary-File-Write-Denial-Of-Service.html), [references](http://seclists.org/fulldisclosure/2022/Jul/9)