CVE-2024-12149

8.1 HIGH

📋 TL;DR

This vulnerability allows authenticated users in Devolutions Remote Desktop Manager to request temporary permissions on entries and receive higher privileges than requested due to incorrect permission assignment. It affects Windows installations of Remote Desktop Manager version 2024.3.19.0 and earlier.

💻 Affected Systems

Products:
  • Devolutions Remote Desktop Manager
Versions: 2024.3.19.0 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the temporary access requests component. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated user could escalate privileges to administrative levels, potentially gaining full control over the Remote Desktop Manager instance and accessing all managed credentials and connections.

🟠

Likely Case

Users with standard access could gain elevated permissions to view or modify entries they shouldn't have access to, leading to credential exposure or unauthorized system access.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to temporary privilege misuse that could be detected and revoked.

🌐 Internet-Facing: LOW (requires authenticated access to the application)
🏢 Internal Only: HIGH (affects internal users with legitimate access to the system)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but appears straightforward based on the vulnerability description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.20.0 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2024-0017

Restart Required: Yes

Instructions:

1. Download latest version from Devolutions website
2. Run installer to upgrade existing installation
3. Restart Remote Desktop Manager service

🔧 Temporary Workarounds

Disable temporary access requests

windows

Temporarily disable the temporary access requests feature to prevent exploitation

Navigate to Administration > Security Settings > Temporary Access and disable the feature

🧯 If You Can't Patch

  • Restrict user permissions to minimum required levels
  • Implement strict monitoring of permission changes and access logs

🔍 How to Verify

Check if Vulnerable:

Check Help > About in Remote Desktop Manager for version number

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify version is 2024.3.20.0 or later in Help > About

📡 Detection & Monitoring

Log Indicators:

  • Unusual permission escalation events
  • Multiple temporary access requests from same user
  • Access to entries outside normal user scope

Network Indicators:

  • Not applicable - local application vulnerability

SIEM Query:

Search for 'temporary access' or 'permission escalation' events in application logs

🔗 References

📤 Share & Export