Famatech Advanced IP Scanner Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Famatech Advanced IP Scanner. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the application's use of Qt. The application loads Qt plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of an administrator. Was ZDI-CAN-20768.
History

Thu, 05 Dec 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Famatech
Famatech advanced Ip Scanner
CPEs cpe:2.3:a:famatech:advanced_ip_scanner:2.5.4594.1:*:*:*:*:*:*:*
Vendors & Products Famatech
Famatech advanced Ip Scanner
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Description Famatech Advanced IP Scanner Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Famatech Advanced IP Scanner. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the application's use of Qt. The application loads Qt plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of an administrator. Was ZDI-CAN-20768.
Title Famatech Advanced IP Scanner Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
Weaknesses CWE-427
References
Metrics cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2024-11-22T20:05:19.320Z

Updated: 2024-12-05T19:36:14.475Z

Reserved: 2024-03-26T18:52:36.420Z

Link: CVE-2024-30376

cve-icon Vulnrichment

Updated: 2024-12-05T19:35:56.877Z

cve-icon NVD

Status : Received

Published: 2024-11-22T20:15:08.667

Modified: 2024-11-22T20:15:08.667

Link: CVE-2024-30376

cve-icon Redhat

No data.