CVE-2024-4454

WithSecure Elements Endpoint Protection Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of WithSecure Elements Endpoint Protection. User interaction on the part of an administrator is required to exploit this vulnerability. The specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23035.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:withsecure:client_security:15:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:elements_endpoint_protection:17:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:email_and_server_security:15:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:server_security:15:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

14 Aug 2025, 19:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.3
v2 : unknown
v3 : 7.8
References () https://www.zerodayinitiative.com/advisories/ZDI-24-491/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-491/ - Third Party Advisory
First Time Withsecure elements Endpoint Protection
Microsoft
Withsecure email And Server Security
Withsecure server Security
Microsoft windows
Withsecure
Withsecure client Security
CPE cpe:2.3:a:withsecure:elements_endpoint_protection:17:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:server_security:15:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:client_security:15:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:email_and_server_security:15:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Information

Published : 2024-05-22 20:15

Updated : 2025-08-14 19:28


NVD link : CVE-2024-4454

Mitre link : CVE-2024-4454

CVE.ORG link : CVE-2024-4454


JSON object : View

Products Affected

withsecure

  • elements_endpoint_protection
  • server_security
  • client_security
  • email_and_server_security

microsoft

  • windows
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')