Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12552: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Wacom Center

0
High
VulnerabilityCVE-2024-12552cvecve-2024-12552cwe-59
Published: Fri Dec 13 2024 (12/13/2024, 22:32:30 UTC)
Source: CVE Database V5
Vendor/Project: Wacom
Product: Center

Description

CVE-2024-12552 is a local privilege escalation vulnerability in Wacom Center version 6. 4. 7. 5003, specifically in the WTabletServicePro. exe component. The flaw arises from improper link resolution before file access (CWE-59), allowing an attacker with low-privileged code execution to create symbolic links that lead to arbitrary file creation. Exploiting this vulnerability enables escalation to SYSTEM privileges, potentially allowing full control over the affected system. No user interaction is required, but initial low-level code execution is a prerequisite. The vulnerability has a CVSS score of 7. 0, indicating high severity, but no known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:27:19 UTC

Technical Analysis

CVE-2024-12552 is a local privilege escalation vulnerability identified in Wacom Center version 6.4.7.5003, specifically within the WTabletServicePro.exe service. The vulnerability is classified under CWE-59, which involves improper link resolution before file access, commonly known as 'link following.' This flaw allows an attacker who already has the ability to execute low-privileged code on the target system to create symbolic links that the WTabletServicePro service follows improperly. By exploiting this, the attacker can cause the service to create or overwrite arbitrary files, effectively escalating their privileges to SYSTEM level. This escalation enables the execution of arbitrary code with the highest system privileges, compromising confidentiality, integrity, and availability of the system. The vulnerability requires local access and does not need user interaction, but it demands that the attacker first obtain low-level code execution, which could be achieved through other vulnerabilities or social engineering. The CVSS 3.0 base score is 7.0, reflecting high severity due to the impact on confidentiality, integrity, and availability, combined with the complexity of exploitation and required privileges. No public exploits have been reported yet, but the vulnerability was disclosed by the Zero Day Initiative (ZDI) as ZDI-CAN-25359. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by affected organizations.

Potential Impact

The primary impact of CVE-2024-12552 is local privilege escalation, allowing attackers with limited access to gain SYSTEM-level privileges on affected Windows systems running Wacom Center 6.4.7.5003. This elevation of privilege can lead to complete system compromise, including the ability to install persistent malware, disable security controls, access sensitive data, and disrupt system availability. Organizations relying on Wacom Center, especially in environments where multiple users share workstations or where attackers may gain initial footholds through phishing or other means, face increased risk of lateral movement and deeper network infiltration. The vulnerability undermines the security boundary between low-privileged users and system-level processes, making it a critical concern for enterprise environments, particularly those with high-value targets or sensitive intellectual property. Although no known exploits are currently in the wild, the vulnerability’s nature and severity make it a likely candidate for future exploitation by threat actors.

Mitigation Recommendations

1. Apply patches or updates from Wacom as soon as they become available to address CVE-2024-12552. 2. Until patches are released, restrict local user permissions to the minimum necessary, preventing untrusted users from executing code or creating symbolic links in directories accessed by WTabletServicePro.exe. 3. Monitor and audit file system changes and symbolic link creations in directories used by Wacom Center services to detect suspicious activity. 4. Employ application whitelisting and endpoint protection solutions to prevent unauthorized execution of low-privileged code that could be leveraged to exploit this vulnerability. 5. Use Windows security features such as Controlled Folder Access and User Account Control (UAC) to limit the impact of potential exploitation. 6. Isolate systems running Wacom Center from untrusted networks and users to reduce the risk of initial low-privileged code execution. 7. Conduct regular security awareness training to reduce the risk of initial compromise vectors that could lead to exploitation of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-12-11T21:53:17.681Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e41b7ef31ef0b59bca1

Added to database: 2/25/2026, 9:48:49 PM

Last enriched: 2/26/2026, 3:27:19 AM

Last updated: 2/26/2026, 11:04:41 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats