Lucene search

K
zdiSimon Zuckerbraun of Trend Micro Zero Day InitiativeZDI-24-363
HistoryApr 09, 2024 - 12:00 a.m.

Microsoft Windows Installer Service Link Following Local Privilege Escalation Vulnerability

2024-04-0900:00:00
Simon Zuckerbraun of Trend Micro Zero Day Initiative
www.zerodayinitiative.com
11
microsoft windows
local privilege escalation
vulnerability
installer service
registry values
arbitrary code
system

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%

This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windows Installer service. By creating a symbolic link, an attacker can abuse the service to write arbitrary registry values. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%