Vulnerability Description
AnyDesk 7.0.9 allows a local user to gain SYSTEM privileges via a symbolic link because the user can write to their own %APPDATA% folder (used for ad.trace and chat) but the product runs as SYSTEM when writing chat-room data there.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Anydesk | Anydesk | 7.0.9 |
Related Weaknesses (CWE)
References
- http://anydesk.comVendor Advisory
- http://packetstormsecurity.com/files/167608/AnyDesk-7.0.9-Arbitrary-File-Write-DExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2022/Jul/9ExploitMailing ListThird Party Advisory
- https://seclists.org/fulldisclosure/2022/Jun/44ExploitMailing ListThird Party Advisory
- http://anydesk.comVendor Advisory
- http://packetstormsecurity.com/files/167608/AnyDesk-7.0.9-Arbitrary-File-Write-DExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2022/Jul/9ExploitMailing ListThird Party Advisory
- https://seclists.org/fulldisclosure/2022/Jun/44ExploitMailing ListThird Party Advisory
FAQ
What is CVE-2022-32450?
CVE-2022-32450 is a vulnerability with a CVSS score of 7.1 (HIGH). AnyDesk 7.0.9 allows a local user to gain SYSTEM privileges via a symbolic link because the user can write to their own %APPDATA% folder (used for ad.trace and chat) but the product runs as SYSTEM whe...
How severe is CVE-2022-32450?
CVE-2022-32450 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-32450?
Check the references section above for vendor advisories and patch information. Affected products include: Anydesk Anydesk.