First published: Wed May 22 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of WithSecure Elements Endpoint Protection. User interaction on the part of an administrator is required to exploit this vulnerability. The specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
F-Secure Elements |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-23035 is classified as potentially critical due to the ability for local attackers to escalate privileges.
To fix ZDI-CAN-23035, ensure you update WithSecure Elements Endpoint Protection to the latest version provided by the vendor.
The risks associated with ZDI-CAN-23035 include unauthorized privilege escalation by local attackers, which may lead to additional exploitation of the system.
ZDI-CAN-23035 affects installations of WithSecure Elements Endpoint Protection that are not updated to the patched version.
Yes, ZDI-CAN-23035 requires user interaction from an administrator to exploit the vulnerability.