CVE-2024-1618

7.8 HIGH

📋 TL;DR

This CVE describes an unquoted search path vulnerability in Faronics Deep Freeze Server Standard that allows local attackers to hijack the DFServ.exe service. By placing a malicious executable with the same name in a higher-priority directory, attackers can execute arbitrary code with SYSTEM privileges when the service starts. This affects organizations using Deep Freeze Server Standard version 8.30.020.4627 or earlier.

💻 Affected Systems

Products:
  • Faronics Deep Freeze Server Standard
Versions: 8.30.020.4627 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Deep Freeze Server Standard is installed and the DFServ.exe service path is unquoted in the Windows service configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains SYSTEM-level code execution, potentially leading to complete system compromise, data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local authenticated attacker elevates privileges to SYSTEM, installs malware, or disrupts Deep Freeze service functionality.

🟢

If Mitigated

Attack limited to service disruption if proper file permissions and directory controls prevent malicious file placement.

🌐 Internet-Facing: LOW - This requires local access to the system; not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any local user (including low-privileged accounts) can potentially exploit this to gain SYSTEM privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local user access and ability to write to directories in the service search path. Exploitation is straightforward once these conditions are met.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 8.30.020.4628 or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/unquoted-item-or-search-path-vulnerability-faronics-deep-freeze-server

Restart Required: Yes

Instructions:

1. Download the latest version from Faronics support portal. 2. Run the installer to upgrade. 3. Restart the Deep Freeze Server service or reboot the system.

🔧 Temporary Workarounds

Apply proper file permissions

windows

Restrict write permissions on directories in the service search path to prevent malicious file placement.

icacls "C:\Program Files\Faronics\Deep Freeze Server" /deny Users:(OI)(CI)W

Quote service path

windows

Manually edit the Windows service configuration to quote the full path to DFServ.exe.

sc config "Deep Freeze Server" binPath= "\"C:\Program Files\Faronics\Deep Freeze Server\DFServ.exe\""

🧯 If You Can't Patch

  • Restrict local user access to systems running Deep Freeze Server
  • Implement strict file integrity monitoring on DFServ.exe and its directory

🔍 How to Verify

Check if Vulnerable:

Check if Deep Freeze Server version is 8.30.020.4627 or earlier and verify if the service path is unquoted using: sc qc "Deep Freeze Server"

Check Version:

Check the version in the Deep Freeze Server console or examine the executable properties.

Verify Fix Applied:

Confirm version is 8.30.020.4628 or later and verify the service path is properly quoted in the service configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service restarts
  • Creation of executable files in Deep Freeze directories by non-admin users
  • Windows Event ID 7045 (service installation)

Network Indicators:

  • Unusual outbound connections from the Deep Freeze Server system

SIEM Query:

source="windows" (event_id=7045 AND service_name="Deep Freeze Server") OR (process_name="DFServ.exe" AND parent_process!="services.exe")

🔗 References

📤 Share & Export