First published: Wed Dec 11 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Authentication is not required to exploit this vulnerability. The specific flaw exists within the product installer. The issue results from the use of a vulnerable version of Telerik Web UI. An attacker can leverage this vulnerability to execute code in the context of NETWORK SERVICE.
Affected Software | Affected Version | How to fix |
---|---|---|
GFI Archiver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-1671 is high due to the potential for remote code execution without authentication.
To fix ZDI-24-1671, update GFI Archiver to the latest version that addresses this vulnerability.
Organizations using GFI Archiver are affected by ZDI-24-1671 due to the flaws in its product installer.
Yes, ZDI-24-1671 can be exploited by attackers without requiring authentication.
ZDI-24-1671 is classified as a remote code execution vulnerability.