An Uncontrolled Search Path Element vulnerability exists which could allow a malicious actor to perform DLL hijacking and execute arbitrary code with escalated privileges.
References
| Link | Resource |
|---|---|
| https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-01 | Third Party Advisory US Government Resource |
| https://www.corporate.carrier.com/product-security/advisories-resources/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
05 Feb 2026, 18:42
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-01 - Third Party Advisory, US Government Resource | |
| References | () https://www.corporate.carrier.com/product-security/advisories-resources/ - Vendor Advisory | |
| CPE | cpe:2.3:a:carrier:block_load:4.00:*:*:*:*:*:*:* cpe:2.3:a:carrier:block_load:*:*:*:*:*:*:*:* |
|
| First Time |
Carrier block Load
Carrier |
04 Mar 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-04 18:15
Updated : 2026-02-05 18:42
NVD link : CVE-2024-10930
Mitre link : CVE-2024-10930
CVE.ORG link : CVE-2024-10930
JSON object : View
Products Affected
carrier
- block_load
CWE
CWE-427
Uncontrolled Search Path Element
