Lucene search

K
zdiIván Almuiña from Hacking Corporation SàrlZDI-24-294
HistoryMar 13, 2024 - 12:00 a.m.

Microsoft Office Performance Monitor Link Following Local Privilege Escalation Vulnerability

2024-03-1300:00:00
Iván Almuiña from Hacking Corporation Sàrl
www.zerodayinitiative.com
15
microsoft office
privilege escalation
vulnerability
local attackers
execute code
symbolic link
arbitrary files
system context

7.4 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Office. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Office Performance Monitor executable. By creating a symbolic link, an attacker can abuse the process to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.

7.4 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%