Famatech Advanced IP Scanner Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Famatech Advanced IP Scanner. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the application's use of Qt. The application loads Qt plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of an administrator. Was ZDI-CAN-20768.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-670/ | Third Party Advisory |
Configurations
History
09 Jan 2025, 16:08
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:radmin:advanced_ip_scanner:2.5.4594.1:*:*:*:*:*:*:* | |
First Time |
Radmin advanced Ip Scanner
Radmin |
|
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-670/ - Third Party Advisory |
22 Nov 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-22 20:15
Updated : 2025-01-09 16:08
NVD link : CVE-2024-30376
Mitre link : CVE-2024-30376
CVE.ORG link : CVE-2024-30376
JSON object : View
Products Affected
radmin
- advanced_ip_scanner
CWE
CWE-427
Uncontrolled Search Path Element