๐Ÿ” CVE Alert

CVE-2024-6260

HIGH 7.0

Malwarebytes Antimalware Link Following Local Privilege Escalation Vulnerability

CVSS Score
7.0
EPSS Score
0.0%
EPSS Percentile
0th

Malwarebytes Antimalware Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Malwarebytes Antimalware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Malwarebytes service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22321.

CWE CWE-59
Vendor malwarebytes
Product anti-malware
Published Nov 22, 2024
Last Updated Dec 5, 2024
Stay Ahead of the Next One

Get instant alerts for malwarebytes anti-malware

Be the first to know when new high vulnerabilities affecting malwarebytes anti-malware are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Versions

Malwarebytes / Anti-Malware
4.6.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
zerodayinitiative.com: https://www.zerodayinitiative.com/advisories/ZDI-24-1195/ malwarebytes.com: https://www.malwarebytes.com/secure/cves