CVE-2020-37047

7.8 HIGH

📋 TL;DR

CVE-2020-37047 is an unquoted service path vulnerability in Deep Instinct Windows Agent that allows local attackers to execute arbitrary code with LocalSystem privileges. Attackers can place malicious executables in the unquoted path to achieve privilege escalation. This affects Windows systems running Deep Instinct Agent version 1.2.29.0.

💻 Affected Systems

Products:
  • Deep Instinct Windows Agent
Versions: 1.2.29.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default installation path C:\Program Files\HP Sure Sense\DeepMgmtService.exe

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via LocalSystem privilege escalation leading to complete control of the Windows host, data theft, and lateral movement capabilities.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative control of the affected system and potentially deploy additional malware.

🟢

If Mitigated

Limited impact if proper endpoint security controls, application whitelisting, and least privilege principles are enforced.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Attackers with initial access to a Windows endpoint can escalate privileges to compromise the entire system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to the system. Public exploit code is available on Exploit-DB (ID 48174).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.2.29.0

Vendor Advisory: https://www.deepinstinct.com/

Restart Required: Yes

Instructions:

1. Update Deep Instinct Windows Agent to latest version. 2. Restart the DeepMgmtService service. 3. Verify the service path is properly quoted in Windows Services.

🔧 Temporary Workarounds

Manually quote service path

windows

Manually update the service path to include quotes around the executable path

sc config DeepMgmtService binPath= "C:\Program Files\HP Sure Sense\DeepMgmtService.exe"

Restrict write permissions

windows

Remove write permissions for non-administrative users to the vulnerable directory path

icacls "C:\Program Files\HP Sure Sense" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized binaries
  • Enforce least privilege principles and restrict local user permissions on affected systems

🔍 How to Verify

Check if Vulnerable:

Check if DeepMgmtService service path is unquoted: sc qc DeepMgmtService | findstr BINARY_PATH_NAME

Check Version:

Check Deep Instinct agent version in Control Panel > Programs and Features or via registry: reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s | findstr /i "Deep Instinct"

Verify Fix Applied:

Verify service path is quoted: sc qc DeepMgmtService should show path with quotes. Check agent version is >1.2.29.0

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing service path modifications
  • Unexpected executables running from C:\Program Files\HP Sure Sense directory
  • Process creation events for suspicious executables in vulnerable path

Network Indicators:

  • Unusual outbound connections from DeepMgmtService.exe
  • Lateral movement attempts from compromised systems

SIEM Query:

EventID=4688 AND (NewProcessName="*Program Files*HP Sure Sense*" OR NewProcessName="*Program Files*HP*Sure*Sense*")

🔗 References

📤 Share & Export