CVE-2024-6871: CWE-732: Incorrect Permission Assignment for Critical Resource in G DATA Total Security
G DATA Total Security Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of autostart tasks. The issue results from incorrect permissions set on folders. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22629.
AI Analysis
Technical Summary
CVE-2024-6871 is a local privilege escalation vulnerability identified in G DATA Total Security version 25.5.15.21. The root cause is improper permission assignment (CWE-732) on folders related to autostart tasks, which are critical for the software's startup processes. These folders have permissions that allow low-privileged users to modify or replace files, enabling an attacker who already has limited code execution capabilities on the system to escalate their privileges to SYSTEM level. This escalation allows arbitrary code execution with the highest privileges on the affected Windows system. The vulnerability requires the attacker to have initial access to execute code with low privileges but does not require user interaction or network access, as indicated by the CVSS vector (AV:L/AC:H/PR:L/UI:N). The complexity is high due to the need for local access and some skill to exploit the permissions flaw. The vulnerability was reported by the Zero Day Initiative (ZDI) as ZDI-CAN-22629 and published on November 22, 2024. No public exploits have been observed in the wild yet, but the high impact on confidentiality, integrity, and availability makes this a critical issue for affected users. The vulnerability affects only the specified version of G DATA Total Security, and no patch links are currently provided, indicating that users must monitor vendor updates closely.
Potential Impact
The vulnerability allows an attacker with limited local access to escalate privileges to SYSTEM, the highest level on Windows systems, enabling full control over the affected machine. This can lead to complete compromise of the endpoint, including the ability to disable security controls, access sensitive data, install persistent malware, or pivot to other network resources. The impact spans confidentiality (access to sensitive information), integrity (modification of system files and security settings), and availability (potential system disruption or denial of service). Organizations relying on G DATA Total Security version 25.5.15.21 are at risk of internal or external threat actors exploiting this flaw if they gain initial low-privileged access. This can be particularly damaging in environments with sensitive data or critical infrastructure. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code may be developed rapidly once details are public.
Mitigation Recommendations
1. Immediately restrict permissions on autostart task folders related to G DATA Total Security to prevent unauthorized modification. 2. Monitor and audit these folders for unexpected changes or additions. 3. Limit local user privileges to the minimum necessary to reduce the chance of initial low-privileged code execution. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect suspicious activities related to privilege escalation attempts. 5. Regularly update and patch G DATA Total Security once the vendor releases a fix addressing this vulnerability. 6. Implement network segmentation to limit lateral movement if a system is compromised. 7. Educate users about the risks of executing untrusted code locally to reduce the likelihood of initial access. 8. Use system hardening best practices to reduce attack surface, including disabling unnecessary autostart entries and services.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Poland, Netherlands, Belgium, Austria, Switzerland
CVE-2024-6871: CWE-732: Incorrect Permission Assignment for Critical Resource in G DATA Total Security
Description
G DATA Total Security Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of autostart tasks. The issue results from incorrect permissions set on folders. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22629.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-6871 is a local privilege escalation vulnerability identified in G DATA Total Security version 25.5.15.21. The root cause is improper permission assignment (CWE-732) on folders related to autostart tasks, which are critical for the software's startup processes. These folders have permissions that allow low-privileged users to modify or replace files, enabling an attacker who already has limited code execution capabilities on the system to escalate their privileges to SYSTEM level. This escalation allows arbitrary code execution with the highest privileges on the affected Windows system. The vulnerability requires the attacker to have initial access to execute code with low privileges but does not require user interaction or network access, as indicated by the CVSS vector (AV:L/AC:H/PR:L/UI:N). The complexity is high due to the need for local access and some skill to exploit the permissions flaw. The vulnerability was reported by the Zero Day Initiative (ZDI) as ZDI-CAN-22629 and published on November 22, 2024. No public exploits have been observed in the wild yet, but the high impact on confidentiality, integrity, and availability makes this a critical issue for affected users. The vulnerability affects only the specified version of G DATA Total Security, and no patch links are currently provided, indicating that users must monitor vendor updates closely.
Potential Impact
The vulnerability allows an attacker with limited local access to escalate privileges to SYSTEM, the highest level on Windows systems, enabling full control over the affected machine. This can lead to complete compromise of the endpoint, including the ability to disable security controls, access sensitive data, install persistent malware, or pivot to other network resources. The impact spans confidentiality (access to sensitive information), integrity (modification of system files and security settings), and availability (potential system disruption or denial of service). Organizations relying on G DATA Total Security version 25.5.15.21 are at risk of internal or external threat actors exploiting this flaw if they gain initial low-privileged access. This can be particularly damaging in environments with sensitive data or critical infrastructure. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code may be developed rapidly once details are public.
Mitigation Recommendations
1. Immediately restrict permissions on autostart task folders related to G DATA Total Security to prevent unauthorized modification. 2. Monitor and audit these folders for unexpected changes or additions. 3. Limit local user privileges to the minimum necessary to reduce the chance of initial low-privileged code execution. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect suspicious activities related to privilege escalation attempts. 5. Regularly update and patch G DATA Total Security once the vendor releases a fix addressing this vulnerability. 6. Implement network segmentation to limit lateral movement if a system is compromised. 7. Educate users about the risks of executing untrusted code locally to reduce the likelihood of initial access. 8. Use system hardening best practices to reduce attack surface, including disabling unnecessary autostart entries and services.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-07-17T23:54:26.449Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6c0eb7ef31ef0b55f6df
Added to database: 2/25/2026, 9:39:26 PM
Last enriched: 2/26/2026, 3:26:09 AM
Last updated: 4/11/2026, 9:28:30 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.