CVE-2024-0219

7.8 HIGH

📋 TL;DR

This CVE describes a privilege escalation vulnerability in Telerik JustDecompile's installer component. Attackers with local access can manipulate installation packages to gain elevated system privileges. Users with Telerik JustDecompile versions before 2024 R1 are affected.

💻 Affected Systems

Products:
  • Telerik JustDecompile
Versions: All versions prior to 2024 R1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires existing JustDecompile installation and local user access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, persistence installation, and lateral movement.

🟠

Likely Case

Malicious insider or compromised user account escalates privileges to install malware, access sensitive data, or modify system configurations.

🟢

If Mitigated

With proper access controls and monitoring, impact limited to isolated systems with quick detection and containment.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring existing local access to the system.
🏢 Internal Only: HIGH - Significant risk in environments with shared workstations, terminal servers, or where users have local access to systems with JustDecompile installed.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and knowledge of installer manipulation techniques. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 R1 or later

Vendor Advisory: https://docs.telerik.com/devtools/justdecompile/knowledge-base/legacy-installer-vulnerability

Restart Required: Yes

Instructions:

1. Download Telerik JustDecompile 2024 R1 or later from official Telerik website. 2. Uninstall previous versions. 3. Install updated version. 4. Restart system if prompted.

🔧 Temporary Workarounds

Remove vulnerable JustDecompile installations

windows

Uninstall Telerik JustDecompile from systems where it's not essential

Control Panel > Programs > Uninstall a program > Select Telerik JustDecompile > Uninstall

Restrict installer permissions

windows

Set strict file permissions on installation directories to prevent manipulation

icacls "C:\Program Files\Telerik\JustDecompile" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)C"

🧯 If You Can't Patch

  • Implement strict least privilege access controls - ensure users only have necessary permissions
  • Monitor for suspicious installer activity and privilege escalation attempts using endpoint detection

🔍 How to Verify

Check if Vulnerable:

Check installed programs list for Telerik JustDecompile versions earlier than 2024 R1

Check Version:

wmic product where "name like '%JustDecompile%'" get version

Verify Fix Applied:

Verify installed version is 2024 R1 or later in program details or About dialog

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Process creation events for JustDecompile installer with unusual parameters
  • Security logs: Unexpected privilege escalation attempts

Network Indicators:

  • Not applicable - local attack only

SIEM Query:

source="Windows Security" AND event_id=4688 AND (process_name="*JustDecompile*" OR command_line="*JustDecompile*")

🔗 References

📤 Share & Export