CVE-2024-4454

WithSecure Elements Endpoint Protection Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of WithSecure Elements Endpoint Protection. User interaction on the part of an administrator is required to exploit this vulnerability. The specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23035.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:withsecure:client_security:15:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:elements_endpoint_protection:17:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:email_and_server_security:15:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:server_security:15:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

14 Aug 2025, 19:28

Type Values Removed Values Added
References () https://www.zerodayinitiative.com/advisories/ZDI-24-491/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-491/ - Third Party Advisory
CPE cpe:2.3:a:withsecure:elements_endpoint_protection:17:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:client_security:15:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:email_and_server_security:15:*:*:*:*:*:*:*
cpe:2.3:a:withsecure:server_security:15:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 7.3
v2 : unknown
v3 : 7.8
First Time Withsecure
Withsecure client Security
Microsoft
Microsoft windows
Withsecure email And Server Security
Withsecure server Security
Withsecure elements Endpoint Protection

21 Nov 2024, 09:42

Type Values Removed Values Added
References () https://www.zerodayinitiative.com/advisories/ZDI-24-491/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-491/ -

24 May 2024, 01:15

Type Values Removed Values Added
Summary
  • (es) Con enlace de protección de endpoints de Secure Elements tras una vulnerabilidad de escalada de privilegios local. Esta vulnerabilidad permite a atacantes locales escalar privilegios en las instalaciones afectadas de WithSecure Elements Endpoint Protection. Se requiere la interacción del usuario por parte de un administrador para aprovechar esta vulnerabilidad. La falla específica existe en el servicio de alojamiento del complemento WithSecure. Al crear un enlace simbólico, un atacante puede abusar del servicio para crear un archivo. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar código arbitrario en el contexto de SYSTEM. Era ZDI-CAN-23035.

22 May 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-22 20:15

Updated : 2025-08-14 19:28


NVD link : CVE-2024-4454

Mitre link : CVE-2024-4454

CVE.ORG link : CVE-2024-4454


JSON object : View

Products Affected

microsoft

  • windows

withsecure

  • elements_endpoint_protection
  • email_and_server_security
  • server_security
  • client_security
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')