Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2026/VULN100
_____________________________________________________________________

DATE                : 30/01/2026

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Withsecure products.

=====================================================================
https://www2.withsecure.com/en/support/security-advisories/cve-2024-27357
https://www2.withsecure.com/en/support/security-advisories/cve-2024-27358
https://www2.withsecure.com/en/support/security-advisories/cve-2024-4454
https://www2.withsecure.com/en/support/security-advisories/cve-2024-45520
https://www2.withsecure.com/en/support/security-advisories/cve-2024-47193
https://www2.withsecure.com/en/support/security-advisories/cve-2025-26790
_____________________________________________________________________

CVE-2024-27357 WithSecure Elements for Mac vulnerable to Local
Privilege Escalation


More information

A Vulnerability during the installation or updated process allows a
local user with administrator privileges to leading to potential
local privilege escalation on WithSecure Mac Products.

This issue was reported to WithSecure as a part of Internal
Vulnerability Reward Program. No known exploit or attack has been
seen in the wild.

WithSecure is not aware of any known exploits for this vulnerability.
Contributors

WithSecure would like to thank following person for bringing this issue
to our attention.


    Status
    Fixed

    Risk level
    High


    Action required

    FIX No User action is required. The required fix has been published
through automatic update channel for Elements agent & MDR with version 24.1

    Please note : End of life date for Client Security for Mac version
15 is on 30th Sept 2024. In order to mitigate this issue admin must take
action to upgrade to Client Security for Mac 16.


    Affected products

    All WithSecure Endpoint Protection products for Mac
        WithSecure Elements Agent for Mac version 23.x & below
        WithSecure Elements Client Security for Mac version 15 & below
        WithSecure MDR version 23.x & below


    Platforms
    All supported platforms for the affected products


    Date issued

    2024-07-26



Max Keasley

WithSecure Security Consultant (UK)


_____________________________________________________________________

CVE-2024-27358 WithSecure Elements for Mac Denial-of-Service (DoS)
Vulnerability



More information

It is possible for a local user to deny an administrator from installing
WithSecure Mac antivirus software on macOS devices. Successful
exploitation of the vulnerability can possibly lead to Deniel of
Service in the system.

This issue was reported to WithSecure as a part of Internal
Vulnerability Reward Program. No known exploit or attack has been
seen in the wild.

WithSecure is not aware of any known exploits for this vulnerability.
Contributors

WithSecure would like to thank following person for bringing this issue
to our attention.


    Status
    Fixed

    Risk level
    Medium


    Action required

    FIX No User action is required. The required fix has been published
through automatic update channel for Elements agent version 24.1

    Please note : End of life date for Client Security for Mac version
15 is on 30th Sept 2024. In order to mitigate this issue admin must take
action to upgrade to Client Security for Mac 16.


    Affected products

    All WithSecure Endpoint Protection products for Mac
        WithSecure Elements Agent for Mac version 23.x & below
        WithSecure Elements Client Security for Mac version 15 & below


    Platforms
    All supported platforms for the affected products


    Date issued

    2024-07-26



Max Keasley

WithSecure Security Consultant (UK)

_____________________________________________________________________

     CVE-2024-4454 WithSecure Elements Vulnerable to Local Privilege
Escalation

More information

A vulnerability in the WithSecure Windows endpoint product allows a
malicious attacker to abuse the service to create an arbitrary file
in the system. An attacker can leverage this vulnerability to perform
local privilege escalation.

Note: An attacker must have administrator privilege prior to exploiting
this vulnerability or an attacker convince/ trick a user with
Administrative privileges to perform an action in order to exploit this
vulnerability

This issue was reported to WithSecure through the Vulnerability Reward
Program. No known exploit or attack has been seen in the wild.


Contributors

WithSecure would like to thank following person for bringing this issue
to our attention.

Nicholas Zubrisky (@NZubrisky) and Michael DePlante (@izobashi)
of Trend Micro Zero Day Initiative (ZDI) team


    Status
    Fixed

    Risk level
    Medium

    Action required

    FIX No User action is required. The required fix has been published through
automatic update channel with USS-Win32/2024-04-29_01


    Affected products

    All WithSecure Endpoint Protection products for Windows 
        WithSecure Client Security 15 onwards 
        WithSecure Server Security 15 onwards
        WithSecure Email and Server Security 15 
        WithSecure Elements Endpoint Protection 17 onwards


    Platforms
    All supported platforms for the affected products


    Date issued

    2024-05-22


_____________________________________________________________________

CVE-2024-45520 Denial-of-Service (DoS) Vulnerability 


More information

A denial-of-service (DoS) vulnerability was discovered in WithSecure 
Atlant Product whereby possible lead to a memory corruption when 
scanning a PE32 file. The exploit can be triggered remotely by an 
attacker.

A successful attack will result in denial-of-service (DoS) of the 
antivirus engine.

This issue was reported to WithSecure as a part of Internal 
Vulnerability Reward Program. WithSecure is not aware of any known 
exploits for this vulnerability.
Contributors

WithSecure would like to thank following person for bringing this 
issue to our attention.

Antti Levomäki & Christian Jalio from Forcepoint




    Status
    Fixed

    Risk level
    Medium


    Action required

    FIX No User action is required. The required fix has been
published through automatic update channel with Pisces/FMLib-Unix
release 17.12.62.30 on 2024-09-12_01

     
    Affected products

        All WithSecure Endpoint Protection products for Mac

            WithSecure Client Security for Mac 15 onwards

            WithSecure Elements Endpoint Protection for Mac 17 onwards

        All Linux Endpoint Protection products

            Linux Security 64 12.0

            Linux Protection 12.0

        WithSecure Atlant (formerly F-Secure Atlant) = 1.0.35-1


    Platforms

    All supported platforms for the affected products


    Date issued

    2024-10-03


_____________________________________________________________________

CVE-2024-47193 Denial-of-Service (DoS) Vulnerability 



More information

It is possible for a local user to deny an administrator from 
installing WithSecure Mac antivirus software or prevent automatic 
upgrade on macOS devices. Successful exploitation of the vulnerability 
can possibly lead to Deniel of Service in the system.

This issue was reported to WithSecure through the Vulnerability Reward 
Program. No known exploit or attack has been seen in the wild.

WithSecure is not aware of any known exploits for this vulnerability.
Contributors

WithSecure would like to thank following person for bringing this 
issue to our attention.

Max Keasley Security Consultant from WithSecure UK




    Status
    Fixed


    Risk level
    Medium


    Action required

    FIX No User action is required. The required fix has been published
through automatic update channel for Elements agent & MDR version 24.3

    Please note : Action required : Admin must take action to upgrade
to Client Security for Mac 16.01


    Affected products
        WithSecure Elements Agent for Mac version 24.2 & below

        WithSecure MDR version 24.1 & below

        WithSecure Business Client Security for Mac version 16.00


    Platforms

    All supported platforms for the affected products


    Date issued

    2024-11-29

_____________________________________________________________________

CVE-2025-26790 Denial-of-Service (DoS) Vulnerability 



More information

A denial-of-service (DoS) vulnerability was discovered in WithSecure 
Atlant Product. This issue was reported to WithSecure through the 
Vulnerability Reward Program. A crash was detected from Atlant when 
scanning a document file. 

The exploit can be triggered remotely by an attacker. A successful 
attack will result in denial-of-service (DoS) of the antivirus engine.

 
Contributors

WithSecure would like to thank following person for bringing this 
issue to our attention.
Antti Levomäki & Christian Jalio from Forcepoint



    Status
    Fixed

    Risk level
    Medium


    Action required

    FIX No User action is required. The required fix has been 
published through automatic update channel with Capricorn verison 
2025-01-20_02


    Affected products
        All Linux Endpoint Protection products    

                    Linux Security 64 12.0
        WithSecure Atlant (formerly F-Secure Atlant) = 1.0.35-1

     
    Platforms

    All supported platforms for the affected products

    Date issued

    2025-02-07


Short description

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26790


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




