CVE-2022-38777
📋 TL;DR
CVE-2022-38777 is a privilege escalation vulnerability in Elastic Endpoint Security for Windows. Unprivileged users can exploit the rollback feature to gain LocalSystem account privileges. This affects Elastic Endpoint Security installations on Windows systems.
💻 Affected Systems
- Elastic Endpoint Security
📦 What is this software?
Endgame by Elastic
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full LocalSystem privileges, allowing complete system compromise, data theft, malware installation, and persistence establishment.
Likely Case
Local attackers escalate privileges to install additional malware, steal credentials, or move laterally within the network.
If Mitigated
With proper access controls and monitoring, impact is limited to isolated systems with quick detection and remediation.
🎯 Exploit Status
Requires local user access but no special privileges. The vulnerability is in the rollback feature implementation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.17.9, 8.5.0, or 8.6.1
Vendor Advisory: https://discuss.elastic.co/t/elastic-7-17-9-8-5-0-and-8-6-1-security-update/324661
Restart Required: Yes
Instructions:
1. Update Elastic Endpoint Security to version 7.17.9, 8.5.0, or 8.6.1 or later. 2. Restart the system or Elastic Endpoint Security service. 3. Verify the update was successful.
🔧 Temporary Workarounds
Restrict local user access
windowsLimit non-administrative user access to systems running Elastic Endpoint Security
Disable unnecessary rollback features
windowsIf rollback functionality is not required, consider disabling it through policy
🧯 If You Can't Patch
- Implement strict access controls to limit local user access to affected systems
- Monitor for privilege escalation attempts and unusual LocalSystem account activity
🔍 How to Verify
Check if Vulnerable:
Check Elastic Endpoint Security version in the application interface or via PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Elastic Endpoint*'} | Select-Object Name, Version
Check Version:
Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Elastic Endpoint*'} | Select-Object Name, Version
Verify Fix Applied:
Confirm version is 7.17.9, 8.5.0, 8.6.1 or later using the same command
📡 Detection & Monitoring
Log Indicators:
- Unusual rollback operations in Elastic Endpoint logs
- Privilege escalation attempts in Windows Security logs
- Unexpected LocalSystem account activity
Network Indicators:
- Unusual outbound connections from systems after privilege escalation
SIEM Query:
source="windows-security" EventID=4672 AND SubjectUserName NOT IN ("SYSTEM", "Administrator") AND PrivilegeList="SeDebugPrivilege"