CVE-2024-1764

7.6 HIGH

📋 TL;DR

This vulnerability allows users in Devolutions Server to retain elevated privileges beyond their intended expiration time. Attackers could exploit this to maintain unauthorized access to sensitive systems. Organizations running affected versions of Devolutions Server are at risk.

💻 Affected Systems

Products:
  • Devolutions Server
Versions: 2023.3.14.0 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using JIT elevation module functionality

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could maintain persistent administrative access to the Devolutions Server environment, potentially compromising all managed systems and credentials.

🟠

Likely Case

Authorized users accidentally or intentionally retain elevated privileges longer than intended, leading to privilege creep and potential policy violations.

🟢

If Mitigated

With proper monitoring and least privilege principles, impact is limited to temporary privilege retention that can be detected and revoked.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated user access to the Devolutions Server interface

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.3.15.0 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2024-0002

Restart Required: Yes

Instructions:

1. Download latest version from Devolutions website. 2. Backup current installation. 3. Run installer with administrative privileges. 4. Restart Devolutions Server service.

🔧 Temporary Workarounds

Disable JIT Elevation

all

Temporarily disable Just-in-Time elevation functionality to prevent exploitation

Navigate to Administration > Security > JIT Elevation Settings and disable the feature

Manual Privilege Review

all

Regularly audit and manually revoke elevated privileges

Review user sessions and manually revoke elevated privileges through administration interface

🧯 If You Can't Patch

  • Implement strict session monitoring and alert on extended privilege usage
  • Enforce regular privilege reviews and manual revocation procedures

🔍 How to Verify

Check if Vulnerable:

Check Devolutions Server version in Administration > About. If version is 2023.3.14.0 or earlier, system is vulnerable.

Check Version:

Check version in web interface at Administration > About or via PowerShell: Get-Service DevolutionsServer | Select-Object -Property Name, DisplayName, Status

Verify Fix Applied:

Verify version is 2023.3.15.0 or later in Administration > About, then test JIT elevation expiration functionality.

📡 Detection & Monitoring

Log Indicators:

  • Extended privilege sessions beyond configured expiration times
  • Multiple privilege elevation requests from same user

Network Indicators:

  • Unusual authentication patterns to privileged resources

SIEM Query:

source="devolutions_server" AND (event_type="privilege_elevation" AND duration>expiration_time)

🔗 References

📤 Share & Export