An Uncontrolled Search Path Element vulnerability exists which could allow a malicious actor to perform DLL hijacking and execute arbitrary code with escalated privileges.
Fixes

Solution

The vulnerability has been fixed in Block Load version 4.2, available for download on the Carrier eDesign Program Downloads website.


Workaround

No workaround given by the vendor.

History

Tue, 04 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Mar 2025 17:45:00 +0000

Type Values Removed Values Added
Description An Uncontrolled Search Path Element vulnerability exists which could allow a malicious actor to perform DLL hijacking and execute arbitrary code with escalated privileges.
Title Carrier Block Load Privilege Escalation
Weaknesses CWE-427
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Carrier

Published:

Updated: 2025-03-04T18:32:38.413Z

Reserved: 2024-11-06T16:56:42.600Z

Link: CVE-2024-10930

cve-icon Vulnrichment

Updated: 2025-03-04T18:32:29.925Z

cve-icon NVD

Status : Received

Published: 2025-03-04T18:15:23.610

Modified: 2025-03-04T18:15:23.610

Link: CVE-2024-10930

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.