Windscribe Directory Traversal Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Windscribe. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the Windscribe Service. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23441.
Metrics
Affected Vendors & Products
References
History
Tue, 27 Aug 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:windscribe:windscribe:*:*:*:*:*:*:*:* | |
Metrics |
ssvc
|
Fri, 23 Aug 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Windscribe
Windscribe windscribe |
|
CPEs | cpe:2.3:a:windscribe:windscribe:2.9.9:*:*:*:*:windows:*:* | |
Vendors & Products |
Windscribe
Windscribe windscribe |
|
Metrics |
cvssV3_1
|
Wed, 21 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Windscribe Directory Traversal Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Windscribe. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windscribe Service. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23441. | |
Title | Windscribe Directory Traversal Local Privilege Escalation Vulnerability | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-27T18:00:05.497Z
Reserved: 2024-06-18T21:03:30.109Z
Link: CVE-2024-6141

Updated: 2024-08-27T17:59:47.474Z

Status : Analyzed
Published: 2024-08-21T17:15:09.660
Modified: 2024-08-23T16:53:48.270
Link: CVE-2024-6141

No data.