CVE-2026-21408
HIGHCVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
beat-access for Windows version 3.0.3 and prior contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with SYSTEM privileges.
Analysis
beat-access for Windows version 3.0.3 and prior allows local attackers with user privileges to execute arbitrary code with SYSTEM-level permissions through insecure DLL search path resolution. An attacker can exploit this vulnerability by placing a malicious DLL in a predictable location, which the application will load and execute during normal operation. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Inventory all Windows systems running beat-access and isolate affected machines from production networks if possible. Within 7 days: Contact the vendor for patch availability and timelines; implement application whitelisting to restrict DLL loading from untrusted locations. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today