CVE-2024-7243: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Panda Security Dome
Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the PSANHost executable. By creating a junction, an attacker can abuse the service to create arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23413.
AI Analysis
Technical Summary
CVE-2024-7243 is a local privilege escalation vulnerability identified in Panda Security Dome version 22.02.01, caused by improper link resolution before file access (CWE-59) in the PSANHost executable. The vulnerability allows an attacker who already has the ability to execute code with low privileges on the target system to escalate those privileges to SYSTEM level. The attack vector involves creating a junction (a type of symbolic link in Windows) that the PSANHost service follows improperly, enabling the attacker to create arbitrary files in locations that would normally require elevated privileges. This flaw stems from the service's failure to securely handle link resolution, allowing it to be tricked into overwriting or creating files with SYSTEM-level permissions. The attacker can then execute arbitrary code with these elevated privileges, compromising the system's confidentiality, integrity, and availability. The CVSS v3.0 score of 7.8 reflects the high impact and relatively low complexity of exploitation, requiring only local access and no user interaction. Although no public exploits are currently known, the vulnerability was assigned by the Zero Day Initiative (ZDI) under CAN-23413 and published on November 22, 2024. No patches have been released yet, increasing the urgency for mitigation. The vulnerability affects only the specified version 22.02.01 of Panda Security Dome, and organizations running this version should consider immediate risk assessment and mitigation steps.
Potential Impact
The impact of CVE-2024-7243 is significant for organizations using Panda Security Dome 22.02.01. Successful exploitation grants attackers SYSTEM-level privileges, effectively full control over the affected host. This level of access allows attackers to bypass security controls, install persistent malware, exfiltrate sensitive data, disrupt operations, or move laterally within networks. Since the vulnerability requires prior low-privileged code execution, it can serve as a critical escalation step in multi-stage attacks. The compromise of security software itself undermines trust in endpoint protection, potentially allowing attackers to disable or evade defenses. Organizations in sectors with stringent security requirements, such as finance, healthcare, government, and critical infrastructure, face heightened risks. The absence of a patch and known exploits in the wild means attackers may develop exploits rapidly, increasing the threat window. Overall, the vulnerability poses a high risk to confidentiality, integrity, and availability of affected systems.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting local user permissions to prevent unauthorized code execution at low privilege levels, as initial access is required for exploitation. 2. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious creation of junctions or file system manipulations related to PSANHost. 3. Isolate critical systems running Panda Security Dome to limit lateral movement opportunities. 4. Regularly audit and monitor logs for unusual file creation or privilege escalation attempts involving the PSANHost service. 5. Engage with Panda Security support to obtain any available patches, hotfixes, or recommended configuration changes as soon as they are released. 6. Consider temporary disabling or restricting the vulnerable service if operationally feasible until a patch is available. 7. Educate system administrators and security teams about this vulnerability to enhance detection and response capabilities. 8. Implement strict control over local user accounts and reduce the attack surface by disabling unnecessary services or features on endpoints running the affected software.
Affected Countries
United States, Spain, Germany, United Kingdom, France, Canada, Australia, Italy, Netherlands, Brazil
CVE-2024-7243: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Panda Security Dome
Description
Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the PSANHost executable. By creating a junction, an attacker can abuse the service to create arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23413.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-7243 is a local privilege escalation vulnerability identified in Panda Security Dome version 22.02.01, caused by improper link resolution before file access (CWE-59) in the PSANHost executable. The vulnerability allows an attacker who already has the ability to execute code with low privileges on the target system to escalate those privileges to SYSTEM level. The attack vector involves creating a junction (a type of symbolic link in Windows) that the PSANHost service follows improperly, enabling the attacker to create arbitrary files in locations that would normally require elevated privileges. This flaw stems from the service's failure to securely handle link resolution, allowing it to be tricked into overwriting or creating files with SYSTEM-level permissions. The attacker can then execute arbitrary code with these elevated privileges, compromising the system's confidentiality, integrity, and availability. The CVSS v3.0 score of 7.8 reflects the high impact and relatively low complexity of exploitation, requiring only local access and no user interaction. Although no public exploits are currently known, the vulnerability was assigned by the Zero Day Initiative (ZDI) under CAN-23413 and published on November 22, 2024. No patches have been released yet, increasing the urgency for mitigation. The vulnerability affects only the specified version 22.02.01 of Panda Security Dome, and organizations running this version should consider immediate risk assessment and mitigation steps.
Potential Impact
The impact of CVE-2024-7243 is significant for organizations using Panda Security Dome 22.02.01. Successful exploitation grants attackers SYSTEM-level privileges, effectively full control over the affected host. This level of access allows attackers to bypass security controls, install persistent malware, exfiltrate sensitive data, disrupt operations, or move laterally within networks. Since the vulnerability requires prior low-privileged code execution, it can serve as a critical escalation step in multi-stage attacks. The compromise of security software itself undermines trust in endpoint protection, potentially allowing attackers to disable or evade defenses. Organizations in sectors with stringent security requirements, such as finance, healthcare, government, and critical infrastructure, face heightened risks. The absence of a patch and known exploits in the wild means attackers may develop exploits rapidly, increasing the threat window. Overall, the vulnerability poses a high risk to confidentiality, integrity, and availability of affected systems.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting local user permissions to prevent unauthorized code execution at low privilege levels, as initial access is required for exploitation. 2. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious creation of junctions or file system manipulations related to PSANHost. 3. Isolate critical systems running Panda Security Dome to limit lateral movement opportunities. 4. Regularly audit and monitor logs for unusual file creation or privilege escalation attempts involving the PSANHost service. 5. Engage with Panda Security support to obtain any available patches, hotfixes, or recommended configuration changes as soon as they are released. 6. Consider temporary disabling or restricting the vulnerable service if operationally feasible until a patch is available. 7. Educate system administrators and security teams about this vulnerability to enhance detection and response capabilities. 8. Implement strict control over local user accounts and reduce the attack surface by disabling unnecessary services or features on endpoints running the affected software.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-07-29T20:31:07.501Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6c12b7ef31ef0b55fa0f
Added to database: 2/25/2026, 9:39:30 PM
Last enriched: 2/28/2026, 1:39:15 AM
Last updated: 4/12/2026, 4:23:27 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.