{"id":51226,"date":"2025-06-13T02:40:11","date_gmt":"2025-06-13T02:40:11","guid":{"rendered":""},"modified":"2025-08-30T04:39:08","modified_gmt":"2025-08-30T10:39:08","slug":"cve-2024-13962-local-privilege-escalation-in-avast-cleanup-premium","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2024-13962-local-privilege-escalation-in-avast-cleanup-premium\/","title":{"rendered":"<strong>CVE-2024-13962: Local Privilege Escalation in Avast Cleanup Premium<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>CVE-2024-13962 is a severe security vulnerability discovered in Gen Digital Inc. Avast Cleanup Premium Version 24.2.16593.17810 on Windows 10 Pro x64. This vulnerability allows local attackers to escalate privileges and execute arbitrary code in the context of the SYSTEM. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4631-privilege-escalation-vulnerability-in-profitori-wordpress-plugin\/\"  data-wpil-monitor-id=\"57431\">privilege escalation vulnerability<\/a> is particularly concerning as it poses a significant threat to the security of all systems running the affected software worldwide. It has the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2021-47668-linux-kernel-vulnerability-leading-to-potential-system-compromise-or-data-leakage\/\"  data-wpil-monitor-id=\"57556\">potential to compromise system integrity and lead to data<\/a> leakage if not mitigated promptly and correctly.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2024-13962<br \/>\nSeverity: High, CVSS score of 7.8<br \/>\nAttack Vector: Local<br \/>\nPrivileges Required: Low<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-34489-critical-local-privilege-escalation-vulnerability-in-gfi-mailessentials\/\"  data-wpil-monitor-id=\"57555\">Privilege escalation<\/a>, potential system compromise, and data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1936433391\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-13961-local-privilege-escalation-vulnerability-in-avast-cleanup-premium\/\"  data-wpil-monitor-id=\"59646\">Avast Cleanup<\/a> Premium| Version 24.2.16593.17810 on Windows 10 Pro x64<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-37838-use-after-free-vulnerability-in-linux-kernel-s-ssi-protocol-driver-due-to-race-condition\/\"  data-wpil-monitor-id=\"57741\">vulnerability occurs due<\/a> to the insecure handling of symbolic links in the TuneupSvc function of the Avast Cleanup Premium software. An attacker can exploit this vulnerability by creating a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-1079-client-remote-code-execution-via-improper-symbolic-link-resolution-in-google-web-designer\/\"  data-wpil-monitor-id=\"59565\">symbolic link<\/a> and leveraging a TOCTTOU (time-of-check to time-of-use) attack. Essentially, the software checks the symbolic link at one point and then uses it at a later time, during which an attacker can alter the link. This misstep allows the attacker to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-1731-privilege-escalation-vulnerability-in-usg-flex-h-series-uos-firmware\/\"  data-wpil-monitor-id=\"57647\">escalate their privileges<\/a> and execute arbitrary code in the context of the SYSTEM, leading to potential system compromise or data leakage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-1682478820\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>The following pseudocode <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49526-out-of-bounds-write-vulnerability-in-illustrator-leading-to-arbitrary-code-execution\/\"  data-wpil-monitor-id=\"75256\">illustrates a conceptual example of how the vulnerability<\/a> might be exploited:<\/p>\n<pre><code class=\"\" data-line=\"\"># Pseudocode for CVE-2024-13962 exploit\ndef exploit():\n# Create a symbolic link\ncreate_symlink(&#039;target_link&#039;, &#039;malicious_link&#039;)\n# Wait for software to check the link\nwhile not is_checked(&#039;target_link&#039;):\ntime.sleep(1)\n# Change the symbolic link after the check\nchange_symlink(&#039;target_link&#039;, &#039;malicious_link&#039;)\n# Execute arbitrary code\nexecute_code_as_system(&#039;malicious_code&#039;)<\/code><\/pre>\n<p>This pseudocode represents the attacker&#8217;s actions. The create_symlink function creates a symbolic link, the is_checked function checks if the link has been validated by the software, the change_symlink function changes the symbolic link after validation, and the execute_code_as_system function executes arbitrary code with <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-0358-privilege-escalation-vulnerability-in-vapix-device-configuration-framework\/\"  data-wpil-monitor-id=\"57885\">escalated privileges<\/a>.<br \/>\nPlease note that this is a simplification of the exploit process for illustrative purposes and does not represent an actual working exploit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview CVE-2024-13962 is a severe security vulnerability discovered in Gen Digital Inc. Avast Cleanup Premium Version 24.2.16593.17810 on Windows 10 Pro x64. This vulnerability allows local attackers to escalate privileges and execute arbitrary code in the context of the SYSTEM. This privilege escalation vulnerability is particularly concerning as it poses a significant threat to the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[82],"product":[],"attack_vector":[76],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-51226","post","type-post","status-publish","format-standard","hentry","category-uncategorized","vendor-microsoft","attack_vector-privilege-escalation"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/51226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=51226"}],"version-history":[{"count":8,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/51226\/revisions"}],"predecessor-version":[{"id":67836,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/51226\/revisions\/67836"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=51226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=51226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=51226"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=51226"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=51226"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=51226"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=51226"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=51226"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=51226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}