Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1868: CWE-59: Improper Link Resolution Before File Access ('Link Following') in G DATA Total Security

0
High
VulnerabilityCVE-2024-1868cvecve-2024-1868cwe-59
Published: Fri Nov 22 2024 (11/22/2024, 20:05:17 UTC)
Source: CVE Database V5
Vendor/Project: G DATA
Product: Total Security

Description

G DATA Total Security Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the G DATA Backup Service. By creating a symbolic link, an attacker can abuse the service to overwrite a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22313.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 09:58:29 UTC

Technical Analysis

CVE-2024-1868 is a local privilege escalation vulnerability affecting G DATA Total Security version 25.5.15.21. The vulnerability is categorized under CWE-59, which involves improper link resolution before file access, commonly referred to as 'link following.' The flaw exists within the G DATA Backup Service component. An attacker who has already gained the ability to execute low-privileged code on the target system can exploit this vulnerability by creating a symbolic link that the backup service follows improperly. This leads to the overwriting of arbitrary files, enabling the attacker to escalate privileges to SYSTEM level. The vulnerability does not require user interaction but does require local access and some level of code execution capability. The CVSS v3.0 score is 7.8 (high), reflecting the ease of exploitation given local access and the severe impact on confidentiality, integrity, and availability. No patches or exploits are currently publicly available, but the vulnerability was responsibly disclosed and tracked as ZDI-CAN-22313. The flaw highlights a common security weakness in handling symbolic links in privileged services, which can be abused to gain elevated privileges and execute arbitrary code with full system rights.

Potential Impact

The potential impact of CVE-2024-1868 is significant for organizations using G DATA Total Security version 25.5.15.21. Successful exploitation allows an attacker with limited local access to escalate privileges to SYSTEM level, effectively gaining full control over the affected system. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, installation of persistent malware, and disruption of system availability. The ability to execute arbitrary code as SYSTEM also enables attackers to bypass security controls, disable defenses, and move laterally within networks. For enterprises, this could result in data breaches, operational downtime, and reputational damage. Since the vulnerability requires local code execution, the initial compromise vector might be through phishing, malicious insiders, or exploitation of other vulnerabilities. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities rapidly after disclosure.

Mitigation Recommendations

1. Monitor G DATA’s official channels for patches addressing CVE-2024-1868 and apply them promptly once released. 2. Restrict local user permissions to prevent unauthorized code execution, minimizing the chance of an attacker gaining the initial foothold required for exploitation. 3. Implement strict controls and monitoring on symbolic link creation and usage, especially in directories accessed by privileged services like the G DATA Backup Service. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious activities related to symbolic link manipulation or privilege escalation attempts. 5. Conduct regular audits of file system permissions and symbolic link usage to identify and remediate potential abuse vectors. 6. Educate users and administrators about the risks of local code execution vulnerabilities and enforce strong endpoint security hygiene. 7. Consider isolating or sandboxing backup services where feasible to limit the impact of potential exploitation. 8. Maintain comprehensive logging and alerting to detect anomalous behavior indicative of privilege escalation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-02-23T19:50:06.409Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6d42b7ef31ef0b56f788

Added to database: 2/25/2026, 9:44:34 PM

Last enriched: 2/26/2026, 9:58:29 AM

Last updated: 4/12/2026, 6:17:42 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses