CVE-2024-10526
Nov. 8, 2024, 7:01 p.m.
None
No Score
Description
Rapid7 Velociraptor MSI Installer versions below 0.73.3 suffer from a vulnerability whereby it creates the installation directory with WRITE_DACL permission to the BUILTIN\\Users group. This allows local users who are not administrators to grant themselves the Full Control permission on Velociraptor's files. By modifying Velociraptor's files, local users can subvert the binary and cause the Velociraptor service to execute arbitrary code as the SYSTEM user, or to replace the Velociraptor binary completely. This issue is fixed in version 0.73.3.
Product(s) Impacted
Product | Versions |
---|---|
Velociraptor MSI Installer |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
CWE-552
Files or Directories Accessible to External Parties
The product makes files or directories accessible to unauthorized actors, even though they should not be.
Tags
Timeline
Published: Nov. 7, 2024, 11:15 a.m.
Last Modified: Nov. 8, 2024, 7:01 p.m.
Last Modified: Nov. 8, 2024, 7:01 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
cve@rapid7.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.