First published: Thu Dec 21 2023(Updated: )
An issue was discovered in Heimdal Thor agent versions 3.4.2 and before on Windows and 2.6.9 and before on macOS, allows attackers to bypass network filtering, execute arbitrary code, and obtain sensitive information via DarkLayer Guard threat prevention module. NOTE: Heimdal disputes the validity of this issue arguing that their DNS Security for Endpoint filters DNS traffic on the endpoint by intercepting system-generated DNS requests. The product was not designed to intercept DNS requests from third-party solutions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Heimdalsecurity Thor | <=3.5.3 | |
Microsoft Windows | ||
All of | ||
Heimdalsecurity Thor | <=2.6.9 | |
Apple iOS and macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29485 is considered a critical vulnerability due to its potential to allow attackers to bypass network security measures and execute arbitrary code.
To mitigate CVE-2023-29485, users should upgrade to Heimdal Thor version 3.5.4 or later on Windows and version 2.6.10 or later on macOS.
CVE-2023-29485 affects Heimdal Thor versions 3.4.2 and earlier on Windows and versions 2.6.9 and earlier on macOS.
Exploiting CVE-2023-29485 can lead to arbitrary code execution and unauthorized access to sensitive information.
Yes, Heimdal has disputed the validity of CVE-2023-29485.