CVE-2024-23773

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers with access to a Windows system to delete any file with SYSTEM privileges through the KSchedulerSvc.exe component in Quest KACE Agent. It affects Quest KACE Agent for Windows versions 12.0.38 and 13.1.23.0. Attackers must already have local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Quest KACE Agent for Windows
Versions: 12.0.38 and 13.1.23.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of the affected versions are vulnerable by default. The vulnerability exists in the KSchedulerSvc.exe component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical system files could be deleted, causing system instability, data loss, or complete system failure, potentially leading to denial of service or facilitating further attacks.

🟠

Likely Case

Attackers delete important configuration files, user data, or security logs to cover tracks, disrupt operations, or prepare for additional attacks.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated systems with minimal operational disruption.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local system access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Malicious insiders or attackers who gain initial access can exploit this to delete critical files across the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. The vulnerability is in a system service running with SYSTEM privileges, making exploitation straightforward once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version as specified in Quest advisory

Vendor Advisory: https://support.quest.com/kb/4375402/quest-response-to-kace-sma-agent-vulnerabilities-cve-2024-23772-cve-2024-23773-cve-2024-23774

Restart Required: Yes

Instructions:

1. Download the latest Quest KACE Agent from the official Quest website. 2. Deploy the update through your existing patch management system. 3. Restart affected systems to complete the installation.

🔧 Temporary Workarounds

Restrict local access

windows

Limit local user access to systems running vulnerable KACE Agent versions through strict access controls and privilege management.

Monitor file deletion events

windows

Enable and monitor Windows Security Event Logs for file deletion events, particularly from the KSchedulerSvc.exe process.

auditpol /set /subcategory:"File System" /success:enable /failure:enable

🧯 If You Can't Patch

  • Implement strict least-privilege access controls to limit who can log into affected systems
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious file deletion activities

🔍 How to Verify

Check if Vulnerable:

Check the version of Quest KACE Agent installed. If version is 12.0.38 or 13.1.23.0, the system is vulnerable.

Check Version:

Check the installed version through the KACE Agent interface or examine the program files directory for version information.

Verify Fix Applied:

Verify the KACE Agent version has been updated to a version later than 13.1.23.0 or 12.0.38 as specified in Quest's advisory.

📡 Detection & Monitoring

Log Indicators:

  • File deletion events from KSchedulerSvc.exe process
  • Unexpected SYSTEM privilege file operations
  • Security logs showing unauthorized file access attempts

Network Indicators:

  • Unusual outbound connections from systems running KACE Agent
  • Lateral movement attempts to systems with KACE Agent

SIEM Query:

EventID=4663 AND ProcessName="KSchedulerSvc.exe" AND AccessMask="0x10000" (Delete access)

🔗 References

📤 Share & Export