Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46466: n/a

0
High
VulnerabilityCVE-2024-46466cvecve-2024-46466
Published: Fri Nov 15 2024 (11/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-46466 is a high-severity vulnerability affecting ZONECENTRAL for Windows versions up to 2024. 3 and Q. 2021. 2. The issue arises because dedicated folders used by ZONECENTRAL are accessible by other users by default, allowing unauthorized access to technical files. This can lead to misuse of these files to perform tasks with elevated privileges, potentially compromising confidentiality and availability. Exploitation requires local access with high attack complexity and no user interaction, but no privileges or authentication are needed initially. The vulnerability stems from improper access control (CWE-276) on sensitive directories. Although no known exploits are currently reported in the wild, organizations using affected versions should urgently review and modify ZONECENTRAL configurations to restrict folder access. This vulnerability poses a significant risk to organizations relying on ZONECENTRAL, especially in sectors with sensitive data or critical infrastructure.

AI-Powered Analysis

AILast updated: 02/26/2026, 08:37:15 UTC

Technical Analysis

CVE-2024-46466 is a vulnerability identified in ZONECENTRAL for Windows, specifically versions up to 2024.3 and Q.2021.2, which have been submitted for ANSSI qualification. The core issue is that dedicated folders used by the application are, by default, accessible to other users on the same system. This improper access control (classified under CWE-276: Incorrect Default Permissions) allows unauthorized users to access technical files that the application relies on. By manipulating these files, attackers can cause the application to execute tasks with elevated privileges, effectively escalating their local privileges. The CVSS v3.1 score of 7.8 reflects a high severity, with an attack vector limited to local access (AV:L), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The scope is changed (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component. The impact is high on confidentiality and availability, but no impact on integrity is noted. No known exploits have been reported yet, but the vulnerability's nature suggests potential for privilege escalation attacks within compromised environments. The vulnerability requires configuration changes to restrict folder access and prevent misuse. No patches are currently linked, so organizations must proactively adjust permissions and monitor for vendor updates.

Potential Impact

The vulnerability allows unauthorized local users to access and misuse technical files within ZONECENTRAL's dedicated folders, leading to privilege escalation. This can compromise the confidentiality of sensitive data stored or processed by the application and disrupt availability by enabling attackers to perform unauthorized tasks with higher privileges. Organizations relying on ZONECENTRAL in multi-user environments face risks of insider threats or lateral movement by attackers who gain local access. The high attack complexity and requirement for local access limit remote exploitation but do not eliminate risk in environments where multiple users share systems or where attackers have obtained initial footholds. The scope change indicates that the impact can extend beyond the application itself, potentially affecting system-wide security. This vulnerability could be leveraged to bypass security controls, access sensitive information, or disrupt critical operations, especially in sectors like government, defense, and critical infrastructure where ZONECENTRAL is deployed and ANSSI qualification is relevant.

Mitigation Recommendations

Organizations should immediately audit and modify the access permissions of ZONECENTRAL's dedicated folders to ensure that only authorized users and system processes have access. This involves setting strict ACLs (Access Control Lists) on these directories to prevent unauthorized read or write operations. Administrators should verify the effective permissions using Windows security tools and remove any default permissions that allow access to other users. Additionally, organizations should monitor file access logs for unusual activity related to these folders. Until official patches or updates are released by the vendor, consider isolating systems running vulnerable versions of ZONECENTRAL to trusted users only and restrict local access. Implementing endpoint detection and response (EDR) solutions can help detect attempts to exploit this vulnerability. Regularly check for vendor advisories and apply patches promptly once available. Finally, conduct user training to minimize the risk of privilege escalation through local access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d00b7ef31ef0b56c284

Added to database: 2/25/2026, 9:43:28 PM

Last enriched: 2/26/2026, 8:37:15 AM

Last updated: 2/26/2026, 9:11:04 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats