Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Zero-Day Vulnerability Discovered in Windows ClassLink Agent
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Zero-Day Vulnerability Discovered in Windows ClassLink Agent
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Zero-Day Vulnerability Discovered in Windows ClassLink Agent

Security

Zero-Day Vulnerability Discovered in Windows ClassLink Agent

A critical zero-day vulnerability in the ClassLink Agent for Microsoft Windows, allowing remote command execution through a single browser click.

Marco Rizal
Last updated: August 21, 2024 10:15 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
ClassLink
SHARE

A critical zero-day vulnerability has been discovered in the ClassLink Agent for Microsoft Windows, posing a significant risk to users.

This vulnerability, identified as a remote command execution flaw, can be triggered by simply visiting a malicious webpage.

Once the user is prompted to click “Allow,” the malicious code executes directly from the browser, enabling attackers to gain control of the system.

The exploit is currently being marketed on a dark web crime forum by a seller operating under the username “tikila.

According to the seller, this zero-day exploit boasts process continuation capabilities and a 100% success rate.

A user asked if the zero-day being discussed is related to a previous ClassLink RCE from 2018 that has already been patched. The seller responded that it is not the same and this is a relatively new vulnerability.

ClassLink Zero Day
Threat actor responding to a user regarding the ClassLink RCE

The asking price for this exploit remains undisclosed, and transactions are conducted exclusively through escrow, with proof of funds required from buyers.

ClassLink is a widely used agent for local file editing, and it is primarily used in educational settings to facilitate access to school resources.

This zero-day vulnerability specifically targets the ClassLink Agent, making it possible for attackers to execute commands and functions on a victim's computer with just a single click in the browser.

How it works

To show proof of the zero-day, the threat actor has shared a demonstration video via Google Drive.

The video showcases the exploit in action: upon clicking “Allow” or even “Deny,” the code executes.

ClassLink demo 1
Figure 1. Browser opens a pop-up to trick users into clicking the button

This then results in the Command Prompt opening up for a millisecond to execute the code which then leads to opening the calculator program.

ClassLink demo 2
Figure 2. Clicking the button results in the calculator opening

The fact that the malicious code executes regardless of the user's choice whether to click Allow or Deny creates a false sense of security, leading users to believe they can safely dismiss the pop-up, only to have the exploit run anyway.

This vulnerability is particularly concerning due to its ease of execution and the immediate impact it can have on compromised systems.

As of time of writing, a patch to address this zero-day is unlikely to be released in the near future, leaving users at risk.

In the meantime, organizations using ClassLink should review their security protocols and consider disabling or limiting the use of the agent until a fix is available.

More Stories

US Government Bans Kaspersky Antivirus Over Security Concerns; Company Denies Allegations

Hacktivists Shut Down French Government Websites in Protest of Telegram CEO's Arrest

GrimResource Malware Hits Chinese Government and Business Computers

Massive Chinese Data Leaked, From Loans, to Real Estate and More

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Lumma Stealer Outsmarts Chrome Your Cookies Are Back on the Menu

Lumma Stealer Outsmarts Chrome, Your Cookies Are Back on the Menu

Hackers Want Your Car Too Why Smart Cars Are Basically Computer On Wheels

Hackers Want Your Car, Too: Why Smart Cars Are Basically Computer On Wheels

Say Goodbye to Spam Alerts with Chromes Latest Update

Say Goodbye to Spam Alerts with Chrome’s Latest Update

Tencent Denies Massive Data Leak of 1.4 Billion QQ Accounts

Tencent Denies Massive Data Leak of 1.4 Billion QQ Accounts

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?