CVE-2024-6260: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Malwarebytes Anti-Malware
Malwarebytes Antimalware Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Malwarebytes Antimalware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Malwarebytes service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22321.
AI Analysis
Technical Summary
CVE-2024-6260 is a local privilege escalation vulnerability identified in Malwarebytes Anti-Malware version 4.6.6. The root cause is improper link resolution before file access, classified under CWE-59. Specifically, the Malwarebytes service improperly handles symbolic links created by a local attacker. By crafting a symbolic link, an attacker can trick the service into deleting arbitrary files, which can be leveraged to escalate privileges from a low-privileged user to SYSTEM level. This escalation allows execution of arbitrary code with the highest system privileges. Exploitation requires the attacker to have initial low-privileged code execution capabilities on the system but does not require user interaction. The vulnerability was reported by the Zero Day Initiative (ZDI) as ZDI-CAN-22321 and has a CVSS v3.0 score of 7.0, indicating high severity. The attack vector is local, with high attack complexity and low privileges required. The vulnerability impacts confidentiality, integrity, and availability by enabling full system compromise. No patches were listed at the time of publication, and no known exploits have been observed in the wild. Organizations relying on Malwarebytes Anti-Malware 4.6.6 should monitor for updates and consider interim mitigations to restrict local user capabilities.
Potential Impact
The vulnerability allows local attackers to escalate privileges to SYSTEM level, which can lead to complete compromise of affected systems. This includes unauthorized access to sensitive data, modification or deletion of critical files, and the ability to install persistent malware or backdoors. The impact extends to confidentiality, integrity, and availability of the system. Since Malwarebytes Anti-Malware is widely used for endpoint protection, exploitation could undermine the security posture of organizations, potentially allowing attackers to bypass security controls and maintain persistence. The requirement for initial low-privileged code execution limits remote exploitation but does not eliminate risk, especially in environments where local user accounts are shared or compromised. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future active exploitation. Organizations with high-value assets or regulatory requirements face increased risk from this vulnerability.
Mitigation Recommendations
1. Apply official patches from Malwarebytes as soon as they become available to address CVE-2024-6260. 2. Until patches are released, restrict local user permissions to prevent unauthorized code execution and symbolic link creation in directories monitored or used by Malwarebytes services. 3. Implement application whitelisting and endpoint protection policies to limit execution of untrusted code by low-privileged users. 4. Monitor file system activity for suspicious symbolic link creation or deletion attempts targeting Malwarebytes service files. 5. Use system integrity monitoring tools to detect unauthorized changes to critical files. 6. Enforce the principle of least privilege for all local accounts and disable unnecessary local accounts. 7. Conduct regular audits of local user permissions and group memberships to reduce the attack surface. 8. Educate system administrators and users about the risks of local privilege escalation and the importance of applying security updates promptly.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, Japan, France, Netherlands, South Korea, Italy
CVE-2024-6260: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Malwarebytes Anti-Malware
Description
Malwarebytes Antimalware Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Malwarebytes Antimalware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Malwarebytes service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22321.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-6260 is a local privilege escalation vulnerability identified in Malwarebytes Anti-Malware version 4.6.6. The root cause is improper link resolution before file access, classified under CWE-59. Specifically, the Malwarebytes service improperly handles symbolic links created by a local attacker. By crafting a symbolic link, an attacker can trick the service into deleting arbitrary files, which can be leveraged to escalate privileges from a low-privileged user to SYSTEM level. This escalation allows execution of arbitrary code with the highest system privileges. Exploitation requires the attacker to have initial low-privileged code execution capabilities on the system but does not require user interaction. The vulnerability was reported by the Zero Day Initiative (ZDI) as ZDI-CAN-22321 and has a CVSS v3.0 score of 7.0, indicating high severity. The attack vector is local, with high attack complexity and low privileges required. The vulnerability impacts confidentiality, integrity, and availability by enabling full system compromise. No patches were listed at the time of publication, and no known exploits have been observed in the wild. Organizations relying on Malwarebytes Anti-Malware 4.6.6 should monitor for updates and consider interim mitigations to restrict local user capabilities.
Potential Impact
The vulnerability allows local attackers to escalate privileges to SYSTEM level, which can lead to complete compromise of affected systems. This includes unauthorized access to sensitive data, modification or deletion of critical files, and the ability to install persistent malware or backdoors. The impact extends to confidentiality, integrity, and availability of the system. Since Malwarebytes Anti-Malware is widely used for endpoint protection, exploitation could undermine the security posture of organizations, potentially allowing attackers to bypass security controls and maintain persistence. The requirement for initial low-privileged code execution limits remote exploitation but does not eliminate risk, especially in environments where local user accounts are shared or compromised. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future active exploitation. Organizations with high-value assets or regulatory requirements face increased risk from this vulnerability.
Mitigation Recommendations
1. Apply official patches from Malwarebytes as soon as they become available to address CVE-2024-6260. 2. Until patches are released, restrict local user permissions to prevent unauthorized code execution and symbolic link creation in directories monitored or used by Malwarebytes services. 3. Implement application whitelisting and endpoint protection policies to limit execution of untrusted code by low-privileged users. 4. Monitor file system activity for suspicious symbolic link creation or deletion attempts targeting Malwarebytes service files. 5. Use system integrity monitoring tools to detect unauthorized changes to critical files. 6. Enforce the principle of least privilege for all local accounts and disable unnecessary local accounts. 7. Conduct regular audits of local user permissions and group memberships to reduce the attack surface. 8. Educate system administrators and users about the risks of local privilege escalation and the importance of applying security updates promptly.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-06-21T21:48:25.129Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6bfeb7ef31ef0b55d6e3
Added to database: 2/25/2026, 9:39:10 PM
Last enriched: 2/28/2026, 1:05:00 AM
Last updated: 4/12/2026, 10:34:00 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.