CVE-2023-4003

7.6 HIGH

📋 TL;DR

This vulnerability allows an unauthenticated attacker with physical access to a workstation running One Identity Password Manager 5.9.7.1 to escalate privileges to SYSTEM level. This affects organizations using this specific version of the password management software where workstations are accessible to potential attackers.

💻 Affected Systems

Products:
  • One Identity Password Manager
Versions: 5.9.7.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects version 5.9.7.1 specifically. Requires physical access to workstation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing installation of malware, credential theft, and persistent backdoor access to the entire system.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive credentials stored in the password manager and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if physical access controls prevent unauthorized workstation access and proper endpoint security is in place.

🌐 Internet-Facing: LOW - Requires physical access to workstation, not remotely exploitable.
🏢 Internal Only: HIGH - Physical access to internal workstations could lead to significant privilege escalation and credential compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access but no authentication. The unspecified method suggests details are not publicly disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 5.9.7.1 (check vendor advisory for specific version)

Vendor Advisory: https://www.gov.il/en/Departments/faq/cve_advisories

Restart Required: Yes

Instructions:

1. Check current version of One Identity Password Manager. 2. Download and install the latest version from official vendor sources. 3. Restart the system to complete installation.

🔧 Temporary Workarounds

Physical Access Controls

all

Implement strict physical security measures to prevent unauthorized access to workstations.

Endpoint Security Hardening

windows

Enable application whitelisting and restrict local privilege escalation capabilities.

🧯 If You Can't Patch

  • Implement strict physical security controls and workstation locking policies
  • Monitor for unusual privilege escalation events and restrict user permissions

🔍 How to Verify

Check if Vulnerable:

Check if One Identity Password Manager version is exactly 5.9.7.1

Check Version:

Check application properties or vendor documentation for version information

Verify Fix Applied:

Verify installed version is newer than 5.9.7.1

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized SYSTEM level process creation

Network Indicators:

  • Local privilege escalation does not generate network traffic

SIEM Query:

EventID=4688 AND NewProcessName contains 'One Identity' AND SubjectUserName='SYSTEM'

🔗 References

📤 Share & Export