Attackers with local access to the medical office computer can
escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by
overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is
writable for all users. In addition, the Elefant installer registers two
Firebird database services which are running as “NT AUTHORITY\SYSTEM”.
Path: C:\Elefant1\Firebird_2\bin\fbserver.exe
Path: C:\Elefant1\Firebird_2\bin\fbguard.exe
Both service binaries are user writable. This means that a local
attacker can rename one of the service binaries, replace the service
executable with a new executable, and then restart the system. Once the
system has rebooted, the new service binary is executed as "NT
AUTHORITY\SYSTEM".
Metrics
Affected Vendors & Products
References
History
Fri, 08 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Hasomed
Hasomed elefant |
|
CPEs | cpe:2.3:a:hasomed:elefant:*:*:*:*:*:*:*:* | |
Vendors & Products |
Hasomed
Hasomed elefant |
|
Metrics |
cvssV3_1
|
Fri, 08 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is writable for all users. In addition, the Elefant installer registers two Firebird database services which are running as “NT AUTHORITY\SYSTEM”. Path: C:\Elefant1\Firebird_2\bin\fbserver.exe Path: C:\Elefant1\Firebird_2\bin\fbguard.exe Both service binaries are user writable. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. Once the system has rebooted, the new service binary is executed as "NT AUTHORITY\SYSTEM". | |
Title | Local Privilege Escalation via Weak Service Binary Permissions | |
Weaknesses | CWE-250 CWE-276 CWE-732 |
|
References |
|
MITRE
Status: PUBLISHED
Assigner: SEC-VLab
Published: 2024-11-08T11:45:04.756Z
Updated: 2024-11-08T15:35:03.204Z
Reserved: 2024-10-25T07:26:12.628Z
Link: CVE-2024-50590
Vulnrichment
Updated: 2024-11-08T15:34:57.247Z
NVD
Status : Awaiting Analysis
Published: 2024-11-08T12:15:14.820
Modified: 2024-11-08T19:01:03.880
Link: CVE-2024-50590
Redhat
No data.