Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29863: n/a

0
High
VulnerabilityCVE-2024-29863cvecve-2024-29863
Published: Fri Apr 05 2024 (04/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A race condition in the installer executable in Qlik Qlikview before versions May 2022 SR3 (12.70.20300) and May 2023 SR2 (12,80.20200) may allow an existing lower privileged user to cause code to be executed in the context of a Windows Administrator.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:37:44 UTC

Technical Analysis

CVE-2024-29863 is a race condition vulnerability identified in the installer executable of Qlik QlikView software versions before May 2022 SR3 (12.70.20300) and May 2023 SR2 (12.80.20200). The flaw arises from improper synchronization during the installation process, which can be exploited by a lower privileged user on a Windows system to execute arbitrary code with elevated Windows Administrator privileges. This race condition (CWE-362) allows an attacker to manipulate the timing of installer operations to gain unauthorized access and control over the system. The vulnerability is local access only (AV:L), requires high attack complexity (AC:H), but only low privileges (PR:L) and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially compromised component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating potential full system compromise. Although no public exploits are currently known, the vulnerability poses a significant risk due to the privilege escalation vector it provides. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by affected organizations. QlikView is widely used in business intelligence and analytics, making this vulnerability particularly concerning for enterprises relying on these tools in Windows environments.

Potential Impact

The vulnerability allows a lower privileged user to escalate privileges to Windows Administrator level, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, manipulation or destruction of critical information, and disruption of business operations. Attackers could install persistent malware, create backdoors, or move laterally within networks, increasing the risk of widespread damage. Organizations using affected QlikView versions in production environments face significant risks, especially those in sectors with sensitive data such as finance, healthcare, and government. The high impact on confidentiality, integrity, and availability underscores the critical nature of this vulnerability. The requirement for local access limits remote exploitation but does not diminish the threat in environments where multiple users share systems or where insider threats exist.

Mitigation Recommendations

1. Monitor Qlik’s official channels for patches and apply updates to May 2022 SR3 (12.70.20300) or later, or May 2023 SR2 (12.80.20200) or later as soon as they become available. 2. Restrict access to systems running QlikView installers to trusted administrators only, minimizing the number of users with local access. 3. Implement strict file system permissions and execution policies to prevent unauthorized users from running or manipulating installer executables. 4. Use application whitelisting to control which executables can run on critical systems. 5. Employ endpoint detection and response (EDR) solutions to monitor for unusual installer activity or privilege escalation attempts. 6. Conduct regular audits of user privileges and remove unnecessary local accounts or rights. 7. Educate users about the risks of running unauthorized installers and enforce least privilege principles. 8. Consider isolating QlikView installation and update processes to dedicated, secured administrative workstations. These steps reduce the attack surface and limit the ability of low-privileged users to exploit the race condition.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6da1b7ef31ef0b5898f0

Added to database: 2/25/2026, 9:46:09 PM

Last enriched: 2/26/2026, 11:37:44 AM

Last updated: 4/12/2026, 1:56:40 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses