Link Following Local Privilege Escalation Vulnerability in TuneupSvc.exe in AVG TuneUp 24.2.16593.9844 on Windows allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging the service to delete a directory
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Fri, 09 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 09 May 2025 15:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Link Following Local Privilege Escalation Vulnerability in TuneupSvc.exe in AVG TuneUp 24.2.16593.9844 on Windows allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging the service to delete a directory | |
| Title | Link Following Local Privilege Escalation Vulnerability in AVG TuneUp 24.2.16593.9844 | |
| Weaknesses | CWE-59 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: NLOK
Published: 2025-05-09T15:20:18.308Z
Updated: 2025-05-09T19:02:14.584Z
Reserved: 2025-05-09T14:11:28.564Z
Link: CVE-2024-13959
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-05-09T19:02:05.276Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-05-09T16:15:23.360
Modified: 2025-05-12T17:32:32.760
Link: CVE-2024-13959
 Redhat
                        Redhat
                    No data.