Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7240: CWE-59: Improper Link Resolution Before File Access ('Link Following') in F-Secure Total

0
High
VulnerabilityCVE-2024-7240cvecve-2024-7240cwe-59
Published: Fri Nov 22 2024 (11/22/2024, 21:12:29 UTC)
Source: CVE Database V5
Vendor/Project: F-Secure
Product: Total

Description

F-Secure Total Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of F-Secure Total. User interaction on the part of an administrator is required to exploit this vulnerability. The specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23005.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 01:38:31 UTC

Technical Analysis

CVE-2024-7240 is a high-severity local privilege escalation vulnerability affecting F-Secure Total version 19.2, specifically within the WithSecure plugin hosting service. The root cause is improper link resolution before file access (CWE-59), commonly known as a 'link following' flaw. This vulnerability allows a local attacker to create a symbolic link that the service follows incorrectly, leading to unauthorized file creation or modification. By exploiting this flaw, the attacker can escalate their privileges from a limited user to SYSTEM level, enabling arbitrary code execution with the highest system privileges. Exploitation requires local access and user interaction by an administrator, which limits remote exploitation but still poses a significant risk in environments where multiple users have local access or where administrators might be tricked into interacting with malicious content. The vulnerability was assigned CVE-2024-7240 and has a CVSS v3.0 base score of 7.3, reflecting high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the potential for severe damage exists due to the SYSTEM-level code execution capability. The vulnerability was discovered and reported by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-23005. Currently, no patches or updates have been linked, so mitigation relies on access control and cautious administrative practices.

Potential Impact

If exploited, this vulnerability allows attackers with local access to escalate privileges to SYSTEM level, which can lead to full system compromise. This includes the ability to execute arbitrary code, install persistent malware, disable security controls, and access sensitive data. The impact spans confidentiality, integrity, and availability, as attackers can manipulate system files, exfiltrate data, or disrupt services. Organizations relying on F-Secure Total 19.2 for endpoint protection may face significant risk if attackers leverage this flaw to bypass security controls. The requirement for administrator interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk in environments with multiple users or where social engineering is feasible. The absence of known exploits in the wild currently limits immediate threat but the vulnerability's nature makes it a high-priority target for attackers once exploit code becomes available.

Mitigation Recommendations

1. Restrict local access strictly to trusted users and minimize the number of users with local login rights on systems running F-Secure Total 19.2. 2. Educate administrators and users about the risks of interacting with untrusted files or links, especially in administrative contexts. 3. Monitor and audit local file system changes and symbolic link creations to detect suspicious activity indicative of exploitation attempts. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block unauthorized code execution. 5. Maintain up-to-date backups and system snapshots to enable recovery in case of compromise. 6. Stay alert for official patches or updates from F-Secure and apply them promptly once released. 7. Consider deploying additional endpoint protection layers that can detect privilege escalation behaviors. 8. Implement strict privilege separation and use least privilege principles to limit the impact of any local compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-07-29T20:29:05.822Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6c12b7ef31ef0b55fa06

Added to database: 2/25/2026, 9:39:30 PM

Last enriched: 2/28/2026, 1:38:31 AM

Last updated: 4/12/2026, 9:28:12 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses