Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6871: CWE-732: Incorrect Permission Assignment for Critical Resource in G DATA Total Security

0
High
VulnerabilityCVE-2024-6871cvecve-2024-6871cwe-732
Published: Fri Nov 22 2024 (11/22/2024, 21:30:23 UTC)
Source: CVE Database V5
Vendor/Project: G DATA
Product: Total Security

Description

CVE-2024-6871 is a local privilege escalation vulnerability in G DATA Total Security version 25. 5. 15. 21 caused by incorrect permission assignments on autostart task folders. An attacker with the ability to execute low-privileged code locally can exploit this flaw to escalate privileges to SYSTEM level by leveraging improperly secured folders. This vulnerability does not require user interaction but does require prior local code execution and has a high CVSS score of 7. The issue stems from CWE-732, indicating incorrect permission assignment for critical resources. No known exploits are currently reported in the wild. Organizations using this specific version of G DATA Total Security should prioritize patching or mitigating this vulnerability to prevent potential full system compromise. The threat primarily affects Windows endpoints where this product is deployed.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:26:09 UTC

Technical Analysis

CVE-2024-6871 is a local privilege escalation vulnerability identified in G DATA Total Security version 25.5.15.21. The root cause is improper permission assignment (CWE-732) on folders related to autostart tasks, which are critical for the software's startup processes. These folders have permissions that allow low-privileged users to modify or replace files, enabling an attacker who already has limited code execution capabilities on the system to escalate their privileges to SYSTEM level. This escalation allows arbitrary code execution with the highest privileges on the affected Windows system. The vulnerability requires the attacker to have initial access to execute code with low privileges but does not require user interaction or network access, as indicated by the CVSS vector (AV:L/AC:H/PR:L/UI:N). The complexity is high due to the need for local access and some skill to exploit the permissions flaw. The vulnerability was reported by the Zero Day Initiative (ZDI) as ZDI-CAN-22629 and published on November 22, 2024. No public exploits have been observed in the wild yet, but the high impact on confidentiality, integrity, and availability makes this a critical issue for affected users. The vulnerability affects only the specified version of G DATA Total Security, and no patch links are currently provided, indicating that users must monitor vendor updates closely.

Potential Impact

The vulnerability allows an attacker with limited local access to escalate privileges to SYSTEM, the highest level on Windows systems, enabling full control over the affected machine. This can lead to complete compromise of the endpoint, including the ability to disable security controls, access sensitive data, install persistent malware, or pivot to other network resources. The impact spans confidentiality (access to sensitive information), integrity (modification of system files and security settings), and availability (potential system disruption or denial of service). Organizations relying on G DATA Total Security version 25.5.15.21 are at risk of internal or external threat actors exploiting this flaw if they gain initial low-privileged access. This can be particularly damaging in environments with sensitive data or critical infrastructure. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code may be developed rapidly once details are public.

Mitigation Recommendations

1. Immediately restrict permissions on autostart task folders related to G DATA Total Security to prevent unauthorized modification. 2. Monitor and audit these folders for unexpected changes or additions. 3. Limit local user privileges to the minimum necessary to reduce the chance of initial low-privileged code execution. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect suspicious activities related to privilege escalation attempts. 5. Regularly update and patch G DATA Total Security once the vendor releases a fix addressing this vulnerability. 6. Implement network segmentation to limit lateral movement if a system is compromised. 7. Educate users about the risks of executing untrusted code locally to reduce the likelihood of initial access. 8. Use system hardening best practices to reduce attack surface, including disabling unnecessary autostart entries and services.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-07-17T23:54:26.449Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6c0eb7ef31ef0b55f6df

Added to database: 2/25/2026, 9:39:26 PM

Last enriched: 2/26/2026, 3:26:09 AM

Last updated: 2/26/2026, 9:46:37 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats