Cyber Posture

CVE-2024-10930

High

Published: 04 March 2025

Published
04 March 2025
Modified
05 February 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0149 81.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2024-10930 is an Uncontrolled Search Path Element vulnerability (CWE-427) that enables DLL hijacking, allowing a malicious actor to execute arbitrary code with escalated privileges. The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and was published on 2025-03-04. It affects software or components detailed in the referenced advisories from CISA and Carrier.

A local attacker with no required privileges can exploit this vulnerability, though it demands low complexity and user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability through arbitrary code execution under escalated privileges.

CISA ICS Advisory ICSA-25-063-01 and Carrier's product security advisories at the provided references outline mitigation strategies and available patches. Security practitioners should consult these sources for specific remediation steps tailored to affected systems.

Details

CWE(s)
CWE-427

Affected Products

carrier
block load
4.00 · 4.10 — 4.16

MITRE ATT&CK Enterprise Techniques

T1574.001 DLL Stealth
Adversaries may abuse dynamic-link library files (DLLs) in order to achieve persistence, escalate privileges, and evade defenses.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

CWE-427 uncontrolled search path directly enables DLL search order hijacking (T1038) for arbitrary code execution; local exploitation with no privileges but escalated privileges matches T1068.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References