8.2
CVE-2024-24810
- EPSS 0.05%
- Veröffentlicht 07.02.2024 03:15:50
- Zuletzt bearbeitet 21.11.2024 08:59:45
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. The .be TEMP folder is vulnerable to DLL redirection attacks that allow the attacker to escalate privileges. This impacts any installer built with the WiX installer framework. This issue has been patched in version 4.0.4.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Firegiant ≫ Wix Toolset Version < 3.14.0
Firegiant ≫ Wix Toolset Version >= 4.0.0 < 4.0.4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.151 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| security-advisories@github.com | 8.2 | 1.5 | 6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
|
CWE-426 Untrusted Search Path
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.