Advisory Details

August 22nd, 2024

G DATA Total Security Scan Server Link Following Local Privilege Escalation Vulnerability

ZDI-24-1159
ZDI-CAN-23381

CVE ID CVE-2024-30377
CVSS SCORE 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS G DATA
AFFECTED PRODUCTS Total Security
VULNERABILITY DETAILS

This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the G DATA AntiVirus Scan Server. By creating a symbolic link, an attacker can abuse the service to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.

ADDITIONAL DETAILS

03/08/24 – ZDI reported the vulnerability to the vendor
03/11/24 – the vendor acknowledged the receipt of the report
07/26/24 – ZDI asked for updates
07/29/24 –The vendor communicated that the fix would be ready fixed by the end of Q3 or in the beginning of Q4
07/30/24 – ZDI notified the vendor of the intention to publish the case as a 0-day advisory

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application


DISCLOSURE TIMELINE
  • 2024-03-08 - Vulnerability reported to vendor
  • 2024-08-22 - Coordinated public release of advisory
  • 2024-08-22 - Advisory Updated
CREDIT Naor Hodorov
BACK TO ADVISORIES