CVE-2024-1150

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to manipulate files on Unix systems running Snow Software Inventory Agent by exploiting improper cryptographic signature verification in Snow Update Packages. Attackers could potentially replace legitimate update packages with malicious ones. All Unix systems running Snow Inventory Agent versions through 7.3.1 are affected.

💻 Affected Systems

Products:
  • Snow Software Inventory Agent
Versions: through 7.3.1
Operating Systems: Unix/Linux systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Unix versions of the Snow Inventory Agent. Windows versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through malicious package installation leading to backdoor persistence, data theft, or ransomware deployment.

🟠

Likely Case

Unauthorized file modification or replacement, potentially leading to privilege escalation or installation of monitoring tools.

🟢

If Mitigated

Limited impact if proper network segmentation and update source validation are in place, though file manipulation risk remains.

🌐 Internet-Facing: MEDIUM - Exploitation requires ability to deliver malicious update packages, which typically requires some network access to update infrastructure.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems could exploit this to manipulate files across the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to intercept or modify update packages, suggesting some level of network access or compromise is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.2 or later

Vendor Advisory: https://community.snowsoftware.com/s/feed/0D5Td000004YtMcKAK

Restart Required: Yes

Instructions:

1. Download Snow Inventory Agent version 7.3.2 or later from official Snow portal. 2. Stop the Snow Inventory Agent service. 3. Install the updated package using your system's package manager. 4. Restart the Snow Inventory Agent service.

🔧 Temporary Workarounds

Restrict Update Sources

linux

Configure firewall rules to only allow Snow Inventory Agent to communicate with official Snow update servers

# Example iptables rule: iptables -A OUTPUT -p tcp --dport 443 -d snowsoftware.com -j ACCEPT
# Block all other outbound update traffic: iptables -A OUTPUT -p tcp --dport 443 -j DROP

Monitor Update Package Integrity

linux

Implement file integrity monitoring on Snow update package directories

# Example auditd rule: auditctl -w /opt/snow/updates/ -p wa -k snow_updates

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Snow Inventory Agent systems from untrusted networks
  • Deploy file integrity monitoring (FIM) on critical directories to detect unauthorized file modifications

🔍 How to Verify

Check if Vulnerable:

Check the Snow Inventory Agent version: cat /opt/snow/agent/version.txt or snowagent --version

Check Version:

snowagent --version 2>/dev/null || cat /opt/snow/agent/version.txt 2>/dev/null || echo 'Version check command not found'

Verify Fix Applied:

Verify version is 7.3.2 or higher and check that update packages are being validated with proper signatures

📡 Detection & Monitoring

Log Indicators:

  • Unexpected update package downloads from non-Snow sources
  • Failed signature verification attempts in Snow agent logs
  • Unauthorized file modifications in /opt/snow directories

Network Indicators:

  • Update traffic to non-Snow domains/IPs
  • Unusual outbound connections from Snow agent systems

SIEM Query:

source="snow_agent.log" AND ("signature verification failed" OR "invalid package" OR "update from" NOT "snowsoftware.com")

🔗 References

📤 Share & Export