First published: Mon Jul 29 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Hydra Sdk Windows Service. The issue lies in the lack of proper permissions set on a folder created by the service. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Panda Dome |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-23429 is considered high due to its potential for privilege escalation by local attackers.
To fix ZDI-CAN-23429, users should apply the latest patches and updates provided by Panda Security for the Dome product.
Users of Panda Security Dome installations are affected by ZDI-CAN-23429, especially if low-privileged code execution is possible.
ZDI-CAN-23429 can enable local privilege escalation attacks, giving attackers elevated rights on the compromised system.
ZDI-CAN-23429 requires that the attacker first execute low-privileged code, which may vary in difficulty depending on the system security.