CVE-2021-42138

7.2 HIGH

📋 TL;DR

CVE-2021-42138 is an entropy weakness vulnerability in SafeNet Agent for Windows Logon that allows a local user to decrypt and access encrypted credentials of other users on the same machine. This affects organizations using Thales SafeNet authentication software for Windows logon. The vulnerability stems from insufficient randomness in cryptographic operations (CWE-331).

💻 Affected Systems

Products:
  • SafeNet Agent for Windows Logon
Versions: Versions prior to 4.3.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where SafeNet Agent for Windows Logon is installed for multi-factor authentication integration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated local attacker could decrypt and steal credentials for all users on the machine, potentially gaining unauthorized access to sensitive systems and data.

🟠

Likely Case

A malicious insider or compromised account could harvest credentials from other users on the same system, leading to lateral movement and privilege escalation.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to credential exposure on individual systems rather than network-wide compromise.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the machine.
🏢 Internal Only: HIGH - Internal users with local access to affected systems can exploit this to steal credentials and escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the machine and understanding of the weak entropy implementation. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.1 and later

Vendor Advisory: https://cpl.thalesgroup.com/support/security-updates

Restart Required: Yes

Instructions:

1. Download SafeNet Agent for Windows Logon version 4.3.1 or later from Thales support portal. 2. Run the installer with administrative privileges. 3. Follow the installation wizard. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local login access to trusted administrators only to reduce attack surface.

Enable Credential Guard

windows

Use Windows Credential Guard to protect credentials in virtualization-based security.

Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V -All
Enable-WindowsOptionalFeature -Online -FeatureName CredentialGuard

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit who can log in locally to affected systems.
  • Enable detailed auditing and monitoring of credential access events and suspicious local activity.

🔍 How to Verify

Check if Vulnerable:

Check SafeNet Agent version via Control Panel > Programs and Features or run: wmic product where "name like 'SafeNet Agent%'" get version

Check Version:

wmic product where "name like 'SafeNet Agent%'" get version

Verify Fix Applied:

Verify installed version is 4.3.1 or higher using the same version check command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual credential access patterns in Windows Security logs (Event ID 4624, 4625, 4672)
  • Multiple failed authentication attempts followed by successful logins from same source

Network Indicators:

  • Unusual authentication traffic patterns to systems using SafeNet Agent

SIEM Query:

source="windows_security" (event_id=4624 OR event_id=4625) AND user="*" AND process_name="*safenet*" | stats count by src_ip, user, process_name

🔗 References

📤 Share & Export