First published: Fri May 03 2024(Updated: )
G DATA Total Security GDBackupSvc Service Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the GDBackupSvc service. By creating a symbolic link, an attacker can abuse the service to create a file with a permissive DACL. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20694.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
G DATA Total Security |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42126 has been assigned a medium severity level due to its potential for local privilege escalation.
To mitigate CVE-2023-42126, update your G DATA Total Security software to the latest version provided by G DATA.
CVE-2023-42126 affects installations of G DATA Total Security that are susceptible to local privilege escalation.
No, CVE-2023-42126 requires the attacker to have local access to the system to exploit the vulnerability.
CVE-2023-42126 can be exploited to escalate user privileges, allowing attackers to gain higher-level access.