Executive Risk Summary
"The WiX toolset vulnerability allows standard users to hijack binaries dropped by the Burn installer in the C:\Windows\Temp directory, resulting in elevation of privileges. This vulnerability is fixed in WiX toolset versions 3.14.1 and 4.0.5."
Operational Audit Arsenal
Target Type Directory
Target Asset C:\Windows\Temp
Standard Path %windir%\Temp
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: C:\Windows\Temp (Directory)
$Targets = 'C:\Windows\Temp'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")
Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue |
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}} Patch Impact Forecast
Reboot Required Unlikely
Installation services may be affected
Internal Work Notes
Elevation of privilege vulnerability in WiX toolset, patched in versions 3.14.1 and 4.0.5, requires update to prevent exploitation
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Official Advisoryhttps://github.com/wixtoolset/issues/security/advisories/GHSA-rf39-3f98-xr7r
Official Advisoryhttps://github.com/wixtoolset/wix/commit/75a8c75d4e02ea219008dc5af7d03869291d61f7
Official Advisoryhttps://github.com/wixtoolset/wix3/commit/6d372e5169f1a334a395cdf496443bc0732098e9
Official Advisoryhttps://github.com/wixtoolset/issues/security/advisories/GHSA-rf39-3f98-xr7r
Official Advisoryhttps://github.com/wixtoolset/wix/commit/75a8c75d4e02ea219008dc5af7d03869291d61f7
Official Advisoryhttps://github.com/wixtoolset/wix3/commit/6d372e5169f1a334a395cdf496443bc0732098e9
Related Microsoft Threats
Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.