First published: Mon Jul 29 2024(Updated: )
Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22829.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Comodo Internet Security Pro | ||
Comodo Internet Security | =12.2.4.8032 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7250 is classified as a local privilege escalation vulnerability, allowing local attackers to escalate their privileges.
To mitigate CVE-2024-7250, apply the latest security updates provided by Comodo for Internet Security Pro.
CVE-2024-7250 affects Comodo Internet Security Pro version 12.2.4.8032.
No, exploitation of CVE-2024-7250 requires local access to the system.
An attacker must first obtain the ability to execute low-privileged code on the affected system.