CVE-2024-0259

7.3 HIGH

📋 TL;DR

This vulnerability allows low-privileged Windows users to overwrite the Robot Schedule Enterprise Agent service executable. When the service restarts, the malicious binary runs with SYSTEM privileges, enabling privilege escalation. Affects Fortra Robot Schedule Enterprise Agent for Windows versions before 3.04.

💻 Affected Systems

Products:
  • Fortra Robot Schedule Enterprise Agent
Versions: All versions prior to 3.04
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Requires low-privileged user access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Low-privileged attacker gains full SYSTEM privileges, enabling complete system compromise, lateral movement, and persistence establishment.

🟠

Likely Case

Authenticated low-privileged user escalates to SYSTEM privileges, gaining full control over the Windows host.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts are detected and blocked before service restart.

🌐 Internet-Facing: LOW - Requires authenticated access to the Windows system.
🏢 Internal Only: HIGH - Any authenticated low-privileged user on affected systems can exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires low-privileged user access and ability to overwrite service binary files. Service restart needed for full privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.04

Vendor Advisory: https://www.fortra.com/security/advisory/fi-2024-005

Restart Required: Yes

Instructions:

1. Download Robot Schedule Enterprise Agent version 3.04 or later from Fortra. 2. Install the update on all affected Windows systems. 3. Restart the Robot Schedule Enterprise Agent service.

🔧 Temporary Workarounds

Restrict File Permissions

windows

Set restrictive ACLs on the Robot Schedule Enterprise Agent installation directory to prevent low-privileged users from modifying executables.

icacls "C:\Program Files\Fortra\Robot Schedule Enterprise Agent\*" /deny "Users:(M)"
icacls "C:\Program Files (x86)\Fortra\Robot Schedule Enterprise Agent\*" /deny "Users:(M)"

Monitor Service Binary Changes

all

Implement file integrity monitoring on the service executable to detect unauthorized modifications.

🧯 If You Can't Patch

  • Restrict low-privileged user access to affected systems
  • Implement strict file permissions on Robot Schedule Enterprise Agent installation directory

🔍 How to Verify

Check if Vulnerable:

Check installed version of Robot Schedule Enterprise Agent. If version is below 3.04, system is vulnerable.

Check Version:

Check Control Panel > Programs and Features or run 'wmic product where name="Robot Schedule Enterprise Agent" get version'

Verify Fix Applied:

Verify installed version is 3.04 or later and test that low-privileged users cannot modify service executable files.

📡 Detection & Monitoring

Log Indicators:

  • File modification events in Robot Schedule Enterprise Agent installation directory
  • Service restart events for Robot Schedule Enterprise Agent
  • Unusual process execution with SYSTEM privileges

Network Indicators:

  • Unusual outbound connections from SYSTEM context processes

SIEM Query:

EventID=4663 AND ObjectName LIKE '%Robot Schedule Enterprise Agent%' AND Accesses='WriteData' OR EventID=7036 AND ServiceName='Robot Schedule Enterprise Agent'

🔗 References

📤 Share & Export