Famatech Advanced IP Scanner Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Famatech Advanced IP Scanner. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the application's use of Qt. The application loads Qt plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of an administrator. Was ZDI-CAN-20768.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-24-670/ | Third Party Advisory | 
Configurations
                    History
                    09 Jan 2025, 16:08
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.zerodayinitiative.com/advisories/ZDI-24-670/ - Third Party Advisory | |
| Summary | 
        
        
  | 
|
| CPE | cpe:2.3:a:radmin:advanced_ip_scanner:2.5.4594.1:*:*:*:*:*:*:* | |
| First Time | 
        
        Radmin advanced Ip Scanner
         Radmin  | 
22 Nov 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-22 20:15
Updated : 2025-01-09 16:08
NVD link : CVE-2024-30376
Mitre link : CVE-2024-30376
CVE.ORG link : CVE-2024-30376
JSON object : View
Products Affected
                radmin
- advanced_ip_scanner
 
CWE
                
                    
                        
                        CWE-427
                        
            Uncontrolled Search Path Element
