CVE-2024-50592
Local Privilege Escalation via Race Condition
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An attacker with local access the to medical office computer can escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by exploiting a race condition in the Elefant Update Service during the repair or update process. When using the repair function, the service queries the server for a list of files and their hashes. In addition, instructions to execute binaries to finalize the repair process are included. The executables are executed as "NT AUTHORITY\SYSTEM" after they are copied over to the user writable installation folder (C:\Elefant1). This means that a user can overwrite either "PostESUUpdate.exe" or "Update_OpenJava.exe" in the time frame after the copy and before the execution of the final repair step. The overwritten executable is then executed as "NT AUTHORITY\SYSTEM".
An attacker with local access the to medical office computer can escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by exploiting a race condition in the Elefant Update Service during the repair or update process. When using the repair function, the service queries the server for a list of files and their hashes. In addition, instructions to execute binaries to finalize the repair process are included. The executables are executed as "NT AUTHORITY\SYSTEM" after they are copied over to the user writable installation folder (C:\Elefant1). This means that a user can overwrite either "PostESUUpdate.exe" or "Update_OpenJava.exe" in the time frame after the copy and before the execution of the final repair step. The overwritten executable is then executed as "NT AUTHORITY\SYSTEM".
HASOMED Elefant versions prior to 24.04.00 and Elefant Software Updater versions prior to 1.4.2.1811 suffer from having an unprotected exposed firebird database, unprotected FHIR API, multiple local privilege escalation, and hardcoded service password vulnerabilities.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-10-25 CVE Reserved
- 2024-11-08 CVE Published
- 2024-11-08 CVE Updated
- 2024-11-11 First Exploit
- 2025-08-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CAPEC
- CAPEC-26: Leveraging Race Conditions
References (3)
URL | Tag | Source |
---|---|---|
https://r.sec-consult.com/hasomed | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/182564 | 2024-11-11 |
URL | Date | SRC |
---|---|---|
https://hasomed.de/produkte/elefant | 2024-11-08 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hasomed Search vendor "Hasomed" | Elefant Search vendor "Hasomed" for product "Elefant" | * | - |
Affected
| ||||||
Hasomed Search vendor "Hasomed" | Elefant Software Updater Search vendor "Hasomed" for product "Elefant Software Updater" | * | - |
Affected
|