CVE-2024-1150
📋 TL;DR
This vulnerability allows attackers to manipulate files on Unix systems running Snow Software Inventory Agent by exploiting improper cryptographic signature verification in Snow Update Packages. Attackers could potentially replace legitimate update packages with malicious ones. All Unix systems running Snow Inventory Agent versions through 7.3.1 are affected.
💻 Affected Systems
- Snow Software Inventory Agent
📦 What is this software?
Snow Inventory Agent by Snowsoftware
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through malicious package installation leading to backdoor persistence, data theft, or ransomware deployment.
Likely Case
Unauthorized file modification or replacement, potentially leading to privilege escalation or installation of monitoring tools.
If Mitigated
Limited impact if proper network segmentation and update source validation are in place, though file manipulation risk remains.
🎯 Exploit Status
Exploitation requires ability to intercept or modify update packages, suggesting some level of network access or compromise is needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.3.2 or later
Vendor Advisory: https://community.snowsoftware.com/s/feed/0D5Td000004YtMcKAK
Restart Required: Yes
Instructions:
1. Download Snow Inventory Agent version 7.3.2 or later from official Snow portal. 2. Stop the Snow Inventory Agent service. 3. Install the updated package using your system's package manager. 4. Restart the Snow Inventory Agent service.
🔧 Temporary Workarounds
Restrict Update Sources
linuxConfigure firewall rules to only allow Snow Inventory Agent to communicate with official Snow update servers
# Example iptables rule: iptables -A OUTPUT -p tcp --dport 443 -d snowsoftware.com -j ACCEPT
# Block all other outbound update traffic: iptables -A OUTPUT -p tcp --dport 443 -j DROP
Monitor Update Package Integrity
linuxImplement file integrity monitoring on Snow update package directories
# Example auditd rule: auditctl -w /opt/snow/updates/ -p wa -k snow_updates
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Snow Inventory Agent systems from untrusted networks
- Deploy file integrity monitoring (FIM) on critical directories to detect unauthorized file modifications
🔍 How to Verify
Check if Vulnerable:
Check the Snow Inventory Agent version: cat /opt/snow/agent/version.txt or snowagent --version
Check Version:
snowagent --version 2>/dev/null || cat /opt/snow/agent/version.txt 2>/dev/null || echo 'Version check command not found'
Verify Fix Applied:
Verify version is 7.3.2 or higher and check that update packages are being validated with proper signatures
📡 Detection & Monitoring
Log Indicators:
- Unexpected update package downloads from non-Snow sources
- Failed signature verification attempts in Snow agent logs
- Unauthorized file modifications in /opt/snow directories
Network Indicators:
- Update traffic to non-Snow domains/IPs
- Unusual outbound connections from Snow agent systems
SIEM Query:
source="snow_agent.log" AND ("signature verification failed" OR "invalid package" OR "update from" NOT "snowsoftware.com")