First published: Wed May 22 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of WithSecure Elements Endpoint Protection. User interaction on the part of an administrator is required to exploit this vulnerability. The specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
WithSecure Elements |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4454 is rated as a high severity vulnerability due to its potential for privilege escalation.
To address CVE-2024-4454, apply the latest security updates provided by WithSecure for Elements Endpoint Protection.
CVE-2024-4454 affects installations of WithSecure Elements Endpoint Protection that allow local attackers to exploit the vulnerability.
Yes, exploiting CVE-2024-4454 requires user interaction from an administrator.
CVE-2024-4454 allows local attackers to escalate their privileges on systems running the affected software.