CVE-2024-13043

7.8 HIGH

📋 TL;DR

This vulnerability in Panda Security Dome allows local attackers to escalate privileges by exploiting a link following flaw in Hotspot Shield. Attackers with initial low-privileged access can create junctions to delete arbitrary files and execute code as SYSTEM. Users of affected Panda Security Dome installations are at risk.

💻 Affected Systems

Products:
  • Panda Security Dome
Versions: Specific version range not provided in CVE description; likely multiple versions before patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Hotspot Shield component to be present and active. Local attacker must already have ability to execute low-privileged code on the target system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, data theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation leading to administrative control of the affected system, potentially enabling credential harvesting and further exploitation.

🟢

If Mitigated

Limited impact if proper endpoint security controls, least privilege principles, and application whitelisting are in place to prevent initial low-privileged code execution.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring initial access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial foothold on a system (via phishing, malware, etc.), this vulnerability enables full system compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to create junctions. The vulnerability is documented by ZDI (ZDI-24-1727), suggesting detailed technical analysis exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references; check vendor advisory for exact version

Vendor Advisory: Not provided in CVE description; check Panda Security website

Restart Required: Yes

Instructions:

1. Check Panda Security Dome version. 2. Apply latest security update from Panda Security. 3. Restart system to ensure patch is fully applied. 4. Verify patch installation.

🔧 Temporary Workarounds

Disable or Remove Hotspot Shield

windows

Remove or disable the vulnerable Hotspot Shield component if not required

Control Panel > Programs > Uninstall a program > Select Panda Security Dome/Hotspot Shield > Uninstall/Modify

Restrict Junction Creation

windows

Implement Group Policy or security settings to restrict low-privileged users from creating symbolic links/junctions

gpedit.msc > Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment > Create symbolic links

🧯 If You Can't Patch

  • Implement strict least privilege principles to limit initial low-privileged access
  • Deploy application control/whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Panda Security Dome version and compare against patched version in vendor advisory. Verify Hotspot Shield component is present.

Check Version:

Check Panda Security Dome interface or Windows Programs list for version information

Verify Fix Applied:

Confirm Panda Security Dome is updated to patched version and Hotspot Shield component has been updated or removed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual junction/symlink creation events in Windows security logs
  • Process creation events showing privilege escalation from low to SYSTEM

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

Windows Security Event ID 4688 with SubjectUserName showing low privilege user and NewProcessName containing SYSTEM context processes

🔗 References

📤 Share & Export