Following our #38c3 talk about exploiting security software for privilege escalation, we're excited to kick off a new blog series! 🎊
Check out our first blog post on our journey to 💥 exploit five reputable security products to gain privileges via COM hijacking: https://neodyme.io/blog/com_hijacking_1/
@buherator @neodyme Sure, the following 5 vulnerabilities were the result of the research:
- CVE-2024-24912 - CheckPoint Harmony
- CVE-2023-6154 - Bitdefender Total Security
- CVE-2023-7241 - Webroot Endpoint Protect
- CVE-2024-36302/ZDI-CAN-22039 - Trend Micro Apex One
- CVE-2024-6510 - AVG Internet Security