First published: Mon Jul 29 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the PSANHost service. By creating a junction, an attacker can abuse the service to create an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Panda Dome |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The ZDI-24-1016 vulnerability is classified as a local privilege escalation vulnerability.
To fix ZDI-24-1016, ensure that you update your Panda Security Dome installation to the latest version available.
The ZDI-24-1016 vulnerability affects users of Panda Security Dome who have not applied the necessary patches.
ZDI-24-1016 can be exploited by local attackers to gain elevated privileges on the affected system.
No, an attacker must already have access to execute low-privileged code on the target system to exploit ZDI-24-1016.