CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-6141

Critical Severity
Windscribe
SVRS
70/100

CVSSv3
7.8/10

EPSS
0.00015/1

CVE-2024-6141 is a Windscribe directory traversal vulnerability that could allow local attackers to escalate privileges. This vulnerability arises from improper validation of user-supplied paths, potentially enabling execution of arbitrary code with SYSTEM privileges. While the CVSS score is 7.8, indicating high severity, the SOCRadar Vulnerability Risk Score (SVRS) is 70.

This vulnerability, also known as ZDI-CAN-23441, resides in the Windscribe Service. Exploitation requires an attacker to initially gain low-privileged code execution on the targeted system. Successful exploitation allows an attacker to escalate privileges, bypassing security restrictions and executing commands with elevated permissions. Due to the potential for significant system compromise and the SVRS proximity to the critical threshold, organizations using Windscribe should prioritize patching this local privilege escalation vulnerability to mitigate the security risk.

No tags available
CVSS:3.1
AV:L
AC:L
PR:L
UI:N
S:U
C:H
I:H
A:H
2024-08-21

2024-08-23
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-6141 is a local privilege escalation vulnerability in Windscribe that allows attackers to gain SYSTEM privileges by exploiting a lack of proper validation in file operations. The SVRS of 34 indicates a moderate risk, requiring attention but not immediate action.

Key Insights:

  • Local Attacker Requirement: Exploitation requires local access to the target system, limiting the attack surface.
  • Privilege Escalation: Successful exploitation grants attackers SYSTEM privileges, enabling them to execute arbitrary code and compromise the entire system.
  • Exploit Availability: Active exploits have been published, increasing the risk of exploitation.

Mitigation Strategies:

  • Apply Software Updates: Install the latest security updates from Windscribe to patch the vulnerability.
  • Restrict Local Access: Implement strong access controls to prevent unauthorized local access to vulnerable systems.
  • Monitor for Suspicious Activity: Use security monitoring tools to detect and respond to any suspicious activity that may indicate exploitation attempts.
  • Educate Users: Train users on the importance of cybersecurity and encourage them to report any suspicious behavior.

Additional Information:

  • Threat Actors/APT Groups: No specific threat actors or groups have been identified as actively exploiting this vulnerability.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: There is no evidence that this vulnerability is actively exploited in the wild.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

ZDI-24-820: Windscribe Directory Traversal Local Privilege Escalation Vulnerability
2024-06-20
ZDI-24-820: Windscribe Directory Traversal Local Privilege Escalation Vulnerability | This vulnerability allows local attackers to escalate privileges on affected installations of Windscribe. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-6141.
cve-2024-6141
cves
rector
privilege escalation
CVE-2024-6141 | WindScribe path traversal
vuldb.com2024-06-21
CVE-2024-6141 | WindScribe path traversal | A vulnerability was found in WindScribe. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to path traversal. This vulnerability is handled as CVE-2024-6141. An attack has to be approached locally. There is no exploit available. It is recommended to upgrade the affected component.
cve-2024-6141
domains
urls
cves

Social Media

CVE-2024-6141 (CVSS:7.8, HIGH) is Analyzed. Windscribe Directory Traversal Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to es..https://t.co/DhclwCMKAL #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
0
0
0
CVE-2024-6141 Windscribe Directory Traversal Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of W… https://t.co/buv44FoPmi
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppWindscribewindscribe

References

ReferenceLink
ZDI-DISCLOSURES@TRENDMICRO.COMhttps://github.com/Windscribe/Desktop-App/blob/90a5cc3c1f50f6545f83969c2ace6b4ac2c91c4e/client/common/changelog.txt#L23
ZDI-DISCLOSURES@TRENDMICRO.COMhttps://www.zerodayinitiative.com/advisories/ZDI-24-820/

CWE Details

CWE IDCWE NameDescription
CWE-22Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence