WithSecure Elements Endpoint Protection Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of WithSecure Elements Endpoint Protection. User interaction on the part of an administrator is required to exploit this vulnerability.
The specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23035.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-491/ |
![]() ![]() ![]() |
History
Thu, 14 Aug 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft
Microsoft windows Withsecure Withsecure client Security Withsecure elements Endpoint Protection Withsecure email And Server Security Withsecure server Security |
|
CPEs | cpe:2.3:a:withsecure:client_security:15:*:*:*:*:*:*:* cpe:2.3:a:withsecure:elements_endpoint_protection:17:*:*:*:*:*:*:* cpe:2.3:a:withsecure:email_and_server_security:15:*:*:*:*:*:*:* cpe:2.3:a:withsecure:server_security:15:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Microsoft
Microsoft windows Withsecure Withsecure client Security Withsecure elements Endpoint Protection Withsecure email And Server Security Withsecure server Security |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-01T20:40:47.114Z
Reserved: 2024-05-02T23:39:34.766Z
Link: CVE-2024-4454

Updated: 2024-08-01T20:40:47.114Z

Status : Analyzed
Published: 2024-05-22T20:15:10.130
Modified: 2025-08-14T19:28:08.170
Link: CVE-2024-4454

No data.