First published: Mon Jul 29 2024(Updated: )
Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Comodo Internet Security Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the cmdagent executable. By creating a symbolic link, an attacker can abuse the agent to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22832.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Comodo Internet Security Pro | ||
Comodo Internet Security | =12.2.4.8032 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7251 is classified as a local privilege escalation vulnerability, indicating significant risk for affected systems.
To fix CVE-2024-7251, update to the latest version of Comodo Internet Security Pro to patch the vulnerability.
CVE-2024-7251 affects users of Comodo Internet Security Pro version 12.2.4.8032.
The potential impacts of CVE-2024-7251 include unauthorized privilege escalation, allowing attackers to gain elevated access to system resources.
There are no known effective workarounds for CVE-2024-7251, and the best mitigation is to apply the available security updates.