Plattform
windows
Komponente
telerik-justdecompile
Behoben in
2024 R1
CVE-2024-0219 describes a privilege elevation vulnerability discovered in Telerik JustDecompile. This flaw allows a lower-privileged user to manipulate the application's installer, potentially gaining elevated privileges on the operating system. The vulnerability affects versions RC2012.1 through 2024 R1. A fix is available in version 2024 R1.
An attacker exploiting this vulnerability could gain unauthorized access to sensitive data, modify system configurations, or execute arbitrary code with elevated privileges. This could lead to a complete compromise of the affected system. The ability to manipulate the installer provides a relatively straightforward attack vector, particularly in environments where JustDecompile is commonly installed. Successful exploitation could allow an attacker to bypass existing security controls and gain persistent access to the system.
This CVE was publicly disclosed on 2024-01-31. Currently, there are no known public exploits or active campaigns targeting this vulnerability. Its inclusion in the NVD suggests potential for exploitation, and organizations should prioritize patching. The ease of exploitation, given the installer manipulation, warrants a medium probability of exploitation.
Organizations using Telerik JustDecompile, particularly those with a large number of developers or systems where JustDecompile is frequently used, are at risk. Environments with weak access controls to installation packages or where users have excessive privileges are especially vulnerable.
• windows / supply-chain:
Get-Process -Name JustDecompile | Select-Object -ExpandProperty Path• windows / supply-chain:
Get-ScheduledTask | Where-Object {$_.TaskName -like '*JustDecompile*'}• windows / supply-chain:
reg query "HKLM\SOFTWARE\Telerik\JustDecompile" /v InstallLocationdisclosure
Exploit-Status
EPSS
0.69% (72% Perzentil)
CVSS-Vektor
The primary mitigation for CVE-2024-0219 is to upgrade Telerik JustDecompile to version 2024 R1 or later. If an immediate upgrade is not feasible, consider restricting access to the installation package and monitoring for suspicious activity related to the installer process. Implement least privilege principles to limit the permissions of users who may interact with the JustDecompile installer. Review existing security policies to ensure they adequately address privilege escalation risks.
Actualice Telerik JustDecompile a la versión 2024 R1 o posterior. Descargue la última versión desde el sitio web oficial de Telerik y siga las instrucciones de instalación. Esto solucionará la vulnerabilidad de elevación de privilegios.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-0219 is a HIGH severity vulnerability in Telerik JustDecompile allowing a lower-privileged user to elevate their privileges by manipulating the installer.
You are affected if you are using Telerik JustDecompile versions RC2012.1 through 2024 R1.
Upgrade to Telerik JustDecompile version 2024 R1 or later to resolve the vulnerability.
Currently, there are no known public exploits or active campaigns targeting CVE-2024-0219, but potential for exploitation exists.
Refer to the Telerik security advisory for detailed information and updates: [https://portal.telerik.com/security/CVE/CVE-2024-0219](https://portal.telerik.com/security/CVE/CVE-2024-0219)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.