A vulnerability in Cisco Meraki Systems Manager (SM) Agent for Windows could allow an authenticated, local attacker to execute arbitrary code with elevated privileges. 
This vulnerability is due to incorrect handling of directory search paths at runtime. A low-privileged attacker could exploit this vulnerability by placing both malicious configuration files and malicious DLL files on an affected system, which would read and execute the files when Cisco Meraki SM launches on startup. A successful exploit could allow the attacker to execute arbitrary code on the affected system with SYSTEM privileges. 
                
            References
                    | Link | Resource | 
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-agent-dll-hj-Ptn7PtKe | Vendor Advisory | 
Configurations
                    History
                    18 Sep 2024, 18:56
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| First Time | Cisco Cisco meraki Systems Manager | |
| CPE | cpe:2.3:a:cisco:meraki_systems_manager:*:*:*:*:*:windows:*:* | |
| References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-agent-dll-hj-Ptn7PtKe - Vendor Advisory | 
12 Sep 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-09-12 20:15
Updated : 2024-09-18 18:56
NVD link : CVE-2024-20430
Mitre link : CVE-2024-20430
CVE.ORG link : CVE-2024-20430
JSON object : View
Products Affected
                cisco
- meraki_systems_manager
CWE
                
                    
                        
                        CWE-427
                        
            Uncontrolled Search Path Element
