CVE-2024-26574: n/a
Insecure Permissions vulnerability in Wondershare Filmora v.13.0.51 allows a local attacker to execute arbitrary code via a crafted script to the WSNativePushService.exe
AI Analysis
Technical Summary
CVE-2024-26574 is an insecure permissions vulnerability identified in Wondershare Filmora version 13.0.51, specifically involving the WSNativePushService.exe executable. The vulnerability arises because the executable or its associated resources have incorrect default permissions (CWE-276), allowing a local attacker with limited privileges to execute arbitrary code by crafting a malicious script targeting this service. The attack vector requires local access but no user interaction, and the attacker needs only low privileges to exploit the flaw. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution can lead to full system compromise, data theft, or disruption of service. The CVSS 3.1 score of 7.8 reflects these risks, with the vector string indicating local attack vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches or known exploits are currently reported, but the presence of insecure permissions on a service executable is a critical security oversight that attackers could leverage in targeted attacks or local privilege escalation scenarios. The vulnerability highlights the importance of secure permission settings on service executables and local system components.
Potential Impact
The potential impact of CVE-2024-26574 is significant for organizations using Wondershare Filmora, especially in environments where multiple users share the same system or where local access controls are weak. Exploitation allows a local attacker to execute arbitrary code with the privileges of the vulnerable service, potentially leading to full system compromise, unauthorized data access, or disruption of critical workflows. This could result in data breaches, intellectual property theft, or operational downtime. Since the vulnerability requires local access, the risk is higher in environments with shared or poorly managed user accounts, such as corporate workstations, educational institutions, or public access computers. The lack of required user interaction increases the likelihood of silent exploitation once local access is obtained. Although no known exploits are currently in the wild, the vulnerability's characteristics make it attractive for attackers aiming to escalate privileges or maintain persistence on compromised systems.
Mitigation Recommendations
To mitigate CVE-2024-26574, organizations should first verify and restrict the permissions on WSNativePushService.exe and related files to ensure that only trusted system accounts have write or modify access. Implement the principle of least privilege for all local user accounts to minimize the risk of exploitation. Monitor and audit local system activities for unusual script executions or modifications to the WSNativePushService.exe service. Until an official patch is released, consider isolating systems running Wondershare Filmora from sensitive networks or restricting local access to trusted personnel only. Employ application whitelisting to prevent unauthorized scripts from executing. Additionally, educate users about the risks of running untrusted scripts or software locally. Once a patch becomes available from Wondershare, prioritize its deployment across all affected systems. Regularly review and update endpoint protection tools to detect potential exploitation attempts targeting this vulnerability.
Affected Countries
United States, China, India, Germany, United Kingdom, Canada, Australia, France, Brazil, Japan
CVE-2024-26574: n/a
Description
Insecure Permissions vulnerability in Wondershare Filmora v.13.0.51 allows a local attacker to execute arbitrary code via a crafted script to the WSNativePushService.exe
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-26574 is an insecure permissions vulnerability identified in Wondershare Filmora version 13.0.51, specifically involving the WSNativePushService.exe executable. The vulnerability arises because the executable or its associated resources have incorrect default permissions (CWE-276), allowing a local attacker with limited privileges to execute arbitrary code by crafting a malicious script targeting this service. The attack vector requires local access but no user interaction, and the attacker needs only low privileges to exploit the flaw. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution can lead to full system compromise, data theft, or disruption of service. The CVSS 3.1 score of 7.8 reflects these risks, with the vector string indicating local attack vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches or known exploits are currently reported, but the presence of insecure permissions on a service executable is a critical security oversight that attackers could leverage in targeted attacks or local privilege escalation scenarios. The vulnerability highlights the importance of secure permission settings on service executables and local system components.
Potential Impact
The potential impact of CVE-2024-26574 is significant for organizations using Wondershare Filmora, especially in environments where multiple users share the same system or where local access controls are weak. Exploitation allows a local attacker to execute arbitrary code with the privileges of the vulnerable service, potentially leading to full system compromise, unauthorized data access, or disruption of critical workflows. This could result in data breaches, intellectual property theft, or operational downtime. Since the vulnerability requires local access, the risk is higher in environments with shared or poorly managed user accounts, such as corporate workstations, educational institutions, or public access computers. The lack of required user interaction increases the likelihood of silent exploitation once local access is obtained. Although no known exploits are currently in the wild, the vulnerability's characteristics make it attractive for attackers aiming to escalate privileges or maintain persistence on compromised systems.
Mitigation Recommendations
To mitigate CVE-2024-26574, organizations should first verify and restrict the permissions on WSNativePushService.exe and related files to ensure that only trusted system accounts have write or modify access. Implement the principle of least privilege for all local user accounts to minimize the risk of exploitation. Monitor and audit local system activities for unusual script executions or modifications to the WSNativePushService.exe service. Until an official patch is released, consider isolating systems running Wondershare Filmora from sensitive networks or restricting local access to trusted personnel only. Employ application whitelisting to prevent unauthorized scripts from executing. Additionally, educate users about the risks of running untrusted scripts or software locally. Once a patch becomes available from Wondershare, prioritize its deployment across all affected systems. Regularly review and update endpoint protection tools to detect potential exploitation attempts targeting this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-02-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d79b7ef31ef0b572bb6
Added to database: 2/25/2026, 9:45:29 PM
Last enriched: 2/28/2026, 10:07:09 AM
Last updated: 4/12/2026, 7:54:22 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.