Jan. 10, 2024, 6 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Only systems with long Win32 path support enabled are affected. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-21310.

attacker attackers code escalation exploit integer integer overflow local local privilege escalation low microsoft microsoft windows order overflow path privilege privileged privilege escalation privileges support system systems target vulnerability win32 windows zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Sr Security Engineer - Colombia

@ Nubank | Colombia, Bogota

Security Engineer, Investigations - i3

@ Meta | Menlo Park, CA | Washington, DC | Remote, US

Cyber Security Engineer

@ ASSYSTEM | Bridgwater, United Kingdom

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States