First published: Thu Dec 19 2024(Updated: )
This vulnerability allows local attackers to disclose sensitive information on affected installations of AnyDesk. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of background images. By creating a junction, an attacker can abuse the service to read arbitrary files. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Affected Software | Affected Version | How to fix |
---|---|---|
AnyDesk |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-1711 is considered critical due to the potential for sensitive information disclosure.
To fix ZDI-24-1711, ensure you update to the latest version of AnyDesk that addresses this vulnerability.
AnyDesk users who have not applied security updates are affected by ZDI-24-1711.
ZDI-24-1711 involves local attacks that require low-privileged code execution to exploit the vulnerability.
The impact of ZDI-24-1711 includes potentially allowing local attackers to disclose sensitive information on the affected system.