CVE-2024-1867

G DATA Total Security Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the G DATA Backup Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22312.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:gdata-software:total_security:*:*:*:*:*:*:*:*

History

03 Jan 2025, 20:47

Type Values Removed Values Added
First Time Gdata-software
Gdata-software total Security
References () https://www.zerodayinitiative.com/advisories/ZDI-24-559/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-559/ - Third Party Advisory
CPE cpe:2.3:a:gdata-software:total_security:*:*:*:*:*:*:*:*

Information

Published : 2024-11-22 20:15

Updated : 2025-01-03 20:47


NVD link : CVE-2024-1867

Mitre link : CVE-2024-1867

CVE.ORG link : CVE-2024-1867


JSON object : View

Products Affected

gdata-software

  • total_security
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')