First published: Fri Nov 22 2024(Updated: )
Malwarebytes Antimalware Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Malwarebytes Antimalware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Malwarebytes service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22321.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Malwarebytes Anti-Malware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6260 is classified as a local privilege escalation vulnerability that can significantly compromise system security.
To fix CVE-2024-6260, update to the latest version of Malwarebytes Anti-Malware as soon as it becomes available.
CVE-2024-6260 affects installations of Malwarebytes Anti-Malware on systems where an attacker can execute low-privileged code.
No, CVE-2024-6260 requires local access to the system for exploitation.
Exploitation of CVE-2024-6260 can allow attackers to gain elevated privileges, potentially leading to complete system control.