CVE-2024-1618
📋 TL;DR
This CVE describes an unquoted search path vulnerability in Faronics Deep Freeze Server Standard that allows local attackers to hijack the DFServ.exe service. By placing a malicious executable with the same name in a higher-priority directory, attackers can execute arbitrary code with SYSTEM privileges when the service starts. This affects organizations using Deep Freeze Server Standard version 8.30.020.4627 or earlier.
💻 Affected Systems
- Faronics Deep Freeze Server Standard
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains SYSTEM-level code execution, potentially leading to complete system compromise, data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Local authenticated attacker elevates privileges to SYSTEM, installs malware, or disrupts Deep Freeze service functionality.
If Mitigated
Attack limited to service disruption if proper file permissions and directory controls prevent malicious file placement.
🎯 Exploit Status
Requires local user access and ability to write to directories in the service search path. Exploitation is straightforward once these conditions are met.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 8.30.020.4628 or later
Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/unquoted-item-or-search-path-vulnerability-faronics-deep-freeze-server
Restart Required: Yes
Instructions:
1. Download the latest version from Faronics support portal. 2. Run the installer to upgrade. 3. Restart the Deep Freeze Server service or reboot the system.
🔧 Temporary Workarounds
Apply proper file permissions
windowsRestrict write permissions on directories in the service search path to prevent malicious file placement.
icacls "C:\Program Files\Faronics\Deep Freeze Server" /deny Users:(OI)(CI)W
Quote service path
windowsManually edit the Windows service configuration to quote the full path to DFServ.exe.
sc config "Deep Freeze Server" binPath= "\"C:\Program Files\Faronics\Deep Freeze Server\DFServ.exe\""
🧯 If You Can't Patch
- Restrict local user access to systems running Deep Freeze Server
- Implement strict file integrity monitoring on DFServ.exe and its directory
🔍 How to Verify
Check if Vulnerable:
Check if Deep Freeze Server version is 8.30.020.4627 or earlier and verify if the service path is unquoted using: sc qc "Deep Freeze Server"
Check Version:
Check the version in the Deep Freeze Server console or examine the executable properties.
Verify Fix Applied:
Confirm version is 8.30.020.4628 or later and verify the service path is properly quoted in the service configuration.
📡 Detection & Monitoring
Log Indicators:
- Unexpected service restarts
- Creation of executable files in Deep Freeze directories by non-admin users
- Windows Event ID 7045 (service installation)
Network Indicators:
- Unusual outbound connections from the Deep Freeze Server system
SIEM Query:
source="windows" (event_id=7045 AND service_name="Deep Freeze Server") OR (process_name="DFServ.exe" AND parent_process!="services.exe")