Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31498: n/a

0
High
VulnerabilityCVE-2024-31498cvecve-2024-31498
Published: Thu Apr 04 2024 (04/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Yubico ykman-gui (aka YubiKey Manager GUI) before 1.2.6 on Windows, when Edge is not used, allows privilege escalation because browser windows can open as Administrator.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 13:10:46 UTC

Technical Analysis

CVE-2024-31498 is a privilege escalation vulnerability identified in Yubico's YubiKey Manager GUI (ykman-gui) for Windows platforms prior to version 1.2.6. The vulnerability arises due to improper handling of browser window elevation when the default browser is not Microsoft Edge. Specifically, when the application attempts to open browser windows, these windows can launch with Administrator privileges unintentionally. This behavior allows a user or process with limited privileges to execute code or commands with elevated Administrator rights, bypassing intended access controls. The vulnerability is categorized under CWE-269 (Improper Privilege Management). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. The scope remains unchanged, but the vulnerability requires some privileges to exploit (PR:L). No public exploits or active exploitation have been reported to date. The issue is resolved in YubiKey Manager GUI version 1.2.6 and later, where proper privilege handling and browser invocation methods have been corrected to prevent unauthorized elevation.

Potential Impact

This vulnerability allows an attacker with limited user privileges on a Windows system running vulnerable versions of YubiKey Manager GUI to escalate their privileges to Administrator. Such elevation can lead to full system compromise, including unauthorized access to sensitive data, installation of persistent malware, disabling security controls, and disruption of system availability. Organizations relying on YubiKey Manager GUI for managing hardware authentication tokens may face increased risk of insider threats or lateral movement by attackers who gain initial footholds with limited privileges. The impact is particularly severe in environments where YubiKey devices are used for critical authentication processes, as compromise of the management tool can undermine overall security posture. The lack of required user interaction and low attack complexity increase the risk of exploitation if an attacker gains initial access. Although no known exploits are currently active, the high CVSS score indicates that successful exploitation would have serious consequences.

Mitigation Recommendations

Organizations should immediately upgrade YubiKey Manager GUI to version 1.2.6 or later, where this privilege escalation vulnerability is addressed. Until patching is possible, restrict access to systems running vulnerable versions to trusted users only and monitor for unusual privilege escalation attempts. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous process launches with elevated privileges. Review and enforce least privilege principles to limit the number of users with administrative rights. Additionally, configure default browsers to Microsoft Edge where feasible, as the vulnerability specifically arises when Edge is not used. Conduct regular audits of privilege assignments and monitor logs for suspicious activity related to YubiKey Manager GUI or browser processes. Educate users about the risks of running untrusted applications with elevated privileges and maintain up-to-date antivirus and endpoint protection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dd2b7ef31ef0b58edb5

Added to database: 2/25/2026, 9:46:58 PM

Last enriched: 2/26/2026, 1:10:46 PM

Last updated: 4/12/2026, 3:39:01 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses