Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is writable for all users. In addition, the Elefant installer registers two Firebird database services which are running as “NT AUTHORITY\SYSTEM”.  Path: C:\Elefant1\Firebird_2\bin\fbserver.exe Path: C:\Elefant1\Firebird_2\bin\fbguard.exe Both service binaries are user writable. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. Once the system has rebooted, the new service binary is executed as "NT AUTHORITY\SYSTEM".
History

Fri, 08 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Hasomed
Hasomed elefant
CPEs cpe:2.3:a:hasomed:elefant:*:*:*:*:*:*:*:*
Vendors & Products Hasomed
Hasomed elefant
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 08 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
Description Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is writable for all users. In addition, the Elefant installer registers two Firebird database services which are running as “NT AUTHORITY\SYSTEM”.  Path: C:\Elefant1\Firebird_2\bin\fbserver.exe Path: C:\Elefant1\Firebird_2\bin\fbguard.exe Both service binaries are user writable. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. Once the system has rebooted, the new service binary is executed as "NT AUTHORITY\SYSTEM".
Title Local Privilege Escalation via Weak Service Binary Permissions
Weaknesses CWE-250
CWE-276
CWE-732
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published: 2024-11-08T11:45:04.756Z

Updated: 2024-11-08T15:35:03.204Z

Reserved: 2024-10-25T07:26:12.628Z

Link: CVE-2024-50590

cve-icon Vulnrichment

Updated: 2024-11-08T15:34:57.247Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-08T12:15:14.820

Modified: 2024-11-08T19:01:03.880

Link: CVE-2024-50590

cve-icon Redhat

No data.