CVE-2024-12908

6.9 MEDIUM

📋 TL;DR

This vulnerability in Delinea Secret Server's protocol handler allows remote code execution through URI comparison flaws before normalization. Attackers can trick users into visiting malicious pages or opening documents that trigger the vulnerable handler, executing arbitrary code on the victim's machine. Organizations using affected versions of Secret Server are at risk.

💻 Affected Systems

Products:
  • Delinea Secret Server
Versions: v11.7.31 with protocol handler version 6.0.3.26
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction (clicking malicious link or opening document) to trigger the vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full control of user's machine through arbitrary code execution, potentially leading to credential theft, lateral movement, and complete system compromise.

🟠

Likely Case

Targeted phishing campaigns trick users into clicking malicious links that exploit the protocol handler, leading to malware installation or credential harvesting.

🟢

If Mitigated

With proper network segmentation, endpoint protection, and user awareness training, exploitation attempts are detected and blocked before successful compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering but technical complexity is low once user interaction is achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Secret Server v11.7.31 with updated protocol handler

Vendor Advisory: https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000049.htm

Restart Required: Yes

Instructions:

1. Download the latest Secret Server update from Delinea's official portal. 2. Apply the patch following Delinea's upgrade documentation. 3. Restart Secret Server services. 4. Verify the protocol handler has been updated to the patched version.

🔧 Temporary Workarounds

Disable protocol handler

windows

Temporarily disable the vulnerable protocol handler to prevent exploitation

Consult Delinea documentation for protocol handler disable procedures

Network filtering

all

Block malicious URI patterns at network perimeter

Configure WAF/IPS to filter suspicious protocol handler calls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Secret Server from user workstations
  • Deploy application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Secret Server version and protocol handler version in administration console

Check Version:

Check Secret Server web interface → Administration → About for version details

Verify Fix Applied:

Verify protocol handler version is updated beyond 6.0.3.26 and test URI normalization functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual protocol handler activations
  • Suspicious URI patterns in web logs
  • Unexpected batch file executions

Network Indicators:

  • Malformed protocol handler calls
  • Suspicious document downloads triggering handlers

SIEM Query:

source="secret_server" AND (event="protocol_handler" OR event="uri_processing") AND uri CONTAINS suspicious_pattern

🔗 References

📤 Share & Export