Link Following Local Privilege Escalation Vulnerability in TuneUp Service in AVG TuneUp Version 23.4 (build 15592) on Windows 10 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack.
History

Fri, 09 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 May 2025 15:30:00 +0000

Type Values Removed Values Added
Description Link Following Local Privilege Escalation Vulnerability in TuneUp Service in AVG TuneUp Version 23.4 (build 15592) on Windows 10 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack.
Title Link Following Local Privilege Escalation Vulnerability in AVG TuneUp Version 23.4
Weaknesses CWE-367
CWE-59
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NLOK

Published: 2025-05-09T15:20:29.660Z

Updated: 2025-05-09T18:54:22.055Z

Reserved: 2025-05-09T14:22:25.969Z

Link: CVE-2024-13960

cve-icon Vulnrichment

Updated: 2025-05-09T18:50:32.097Z

cve-icon NVD

Status : Received

Published: 2025-05-09T16:15:23.473

Modified: 2025-05-09T16:15:23.473

Link: CVE-2024-13960

cve-icon Redhat

No data.