cve/2024/CVE-2024-13959.md

19 lines
967 B
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-13959](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13959)
![](https://img.shields.io/static/v1?label=Product&message=TuneUp&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=24.2.16593.9844%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20('Link%20Following')&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
Link Following Local Privilege Escalation Vulnerability in TuneupSvc.exe in AVG TuneUp 24.2.16593.9844 on Windows allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging the service to delete a directory
### POC
#### Reference
- https://www.gendigital.com/us/en/contact-us/security-advisories/
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/ARPSyndicate/cve-scores
2025-09-29 16:08:36 +00:00