First published: Wed May 22 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of WithSecure Elements Endpoint Protection. User interaction on the part of an administrator is required to exploit this vulnerability. The specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
WithSecure Elements |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-491 is critical due to potential privilege escalation by local attackers.
To fix ZDI-24-491, you should apply the latest security updates provided by WithSecure for Elements Endpoint Protection.
ZDI-24-491 affects installations of WithSecure Elements Endpoint Protection where user interaction is possible.
No, ZDI-24-491 requires local access for an administrator to exploit the vulnerability.
ZDI-24-491 can facilitate privilege escalation attacks on vulnerable systems.