CVE-2024-50590
Local Privilege Escalation via Weak Service Binary Permissions
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is writable for all users. In addition, the Elefant installer registers two Firebird database services which are running as “NT AUTHORITY\SYSTEM”. Path: C:\Elefant1\Firebird_2\bin\fbserver.exe Path: C:\Elefant1\Firebird_2\bin\fbguard.exe Both service binaries are user writable. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. Once the system has rebooted, the new service binary is executed as "NT AUTHORITY\SYSTEM".
Los atacantes con acceso local al equipo del consultorio médico pueden escalar sus privilegios de usuario de Windows a "NT AUTHORITY\SYSTEM" sobrescribiendo uno de los dos binarios de servicio de Elefant con permisos débiles. El directorio de instalación predeterminado de Elefant es "C:\Elefant1", que es escribible para todos los usuarios. Además, el instalador de Elefant registra dos servicios de base de datos de Firebird que se ejecutan como "NT AUTHORITY\SYSTEM". Ruta: C:\Elefant1\Firebird_2\bin\fbserver.exe Ruta: C:\Elefant1\Firebird_2\bin\fbguard.exe Ambos binarios de servicio son escribibles por el usuario. Esto significa que un atacante local puede cambiar el nombre de uno de los binarios de servicio, reemplazar el ejecutable de servicio con un nuevo ejecutable y luego reiniciar el sistema. Una vez que el sistema se ha reiniciado, el nuevo binario de servicio se ejecuta como "NT AUTHORITY\SYSTEM".
Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is writable for all users. In addition, the Elefant installer registers two Firebird database services which are running as “NT AUTHORITY\SYSTEM”. Path: C:\Elefant1\Firebird_2\bin\fbserver.exe Path: C:\Elefant1\Firebird_2\bin\fbguard.exe Both service binaries are user writable. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. Once the system has rebooted, the new service binary is executed as "NT AUTHORITY\SYSTEM".
HASOMED Elefant versions prior to 24.04.00 and Elefant Software Updater versions prior to 1.4.2.1811 suffer from having an unprotected exposed firebird database, unprotected FHIR API, multiple local privilege escalation, and hardcoded service password vulnerabilities.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-10-25 CVE Reserved
- 2024-11-08 CVE Published
- 2024-11-08 CVE Updated
- 2024-11-11 First Exploit
- 2025-06-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-250: Execution with Unnecessary Privileges
- CWE-276: Incorrect Default Permissions
- CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
- CAPEC-642: Replace Binaries
References (3)
URL | Tag | Source |
---|---|---|
https://r.sec-consult.com/hasomed | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/182564 | 2024-11-11 |
URL | Date | SRC |
---|---|---|
https://hasomed.de/produkte/elefant | 2024-11-08 |
URL | Date | SRC |
---|