A potential DLL hijacking vulnerability in the SanDisk PrivateAccess application for Windows that could lead to arbitrary code execution in the context of the system user. This vulnerability is only exploitable locally if an attacker has access to a copy of the user's vault or has already gained access into a user's system. This attack is limited to the system in context and cannot be propagated.
References
Configurations
No configuration.
History
21 Nov 2024, 08:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.westerndigital.com/support/product-security/wdc-24002-sandisk-privateaccess-desktop-app-v-6-4-11 - |
24 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) A potential DLL hijacking vulnerability in the SanDisk PrivateAccess application for Windows that could lead to arbitrary code execution in the context of the system user. This vulnerability is only exploitable locally if an attacker has access to a copy of the user's vault or has already gained access into a user's system. This attack is limited to the system in context and cannot be propagated. |
14 Mar 2024, 12:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Mar 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-13 21:15
Updated : 2024-11-21 08:55
NVD link : CVE-2024-22167
Mitre link : CVE-2024-22167
CVE.ORG link : CVE-2024-22167
JSON object : View
Products Affected
No product.
CWE
CWE-427
Uncontrolled Search Path Element