Description
A local privilege escalation is caused by Overwolf
loading and executing certain dynamic link library files from a user-writeable
folder in SYSTEM context on launch. This allows an attacker with unprivileged
access to the system to run arbitrary code with SYSTEM privileges by placing a
malicious .dll file in the respective location.
Published: 2024-09-04
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-48686 A local privilege escalation is caused by Overwolf loading and executing certain dynamic link library files from a user-writeable folder in SYSTEM context on launch. This allows an attacker with unprivileged access to the system to run arbitrary code with SYSTEM privileges by placing a malicious .dll file in the respective location.
References
History

Wed, 04 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Overwolf
Overwolf overwolf
CPEs cpe:2.3:a:overwolf:overwolf:*:*:*:*:*:*:*:*
Vendors & Products Overwolf
Overwolf overwolf
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Sep 2024 13:00:00 +0000

Type Values Removed Values Added
Description A local privilege escalation is caused by Overwolf loading and executing certain dynamic link library files from a user-writeable folder in SYSTEM context on launch. This allows an attacker with unprivileged access to the system to run arbitrary code with SYSTEM privileges by placing a malicious .dll file in the respective location.
Title Local privilege escalation in Overwolf
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Overwolf Overwolf
cve-icon MITRE

Status: PUBLISHED

Assigner: cirosec

Published:

Updated: 2024-09-04T13:15:24.562Z

Reserved: 2024-08-15T07:21:21.987Z

Link: CVE-2024-7834

cve-icon Vulnrichment

Updated: 2024-09-04T13:15:18.368Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-04T13:15:07.030

Modified: 2024-09-05T17:52:06.147

Link: CVE-2024-7834

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses