CVE-2024-23847

5.9 MEDIUM

📋 TL;DR

This CVE describes an incorrect default permissions vulnerability in Unifier and Unifier Cast software that allows local attackers to execute arbitrary code with LocalSystem privileges. Attackers could install malicious programs, alter data, or delete files. Organizations using affected versions of these products are at risk.

💻 Affected Systems

Products:
  • Unifier
  • Unifier Cast
Versions: Specific versions not detailed in provided references; check vendor advisories for exact affected versions
Operating Systems: Windows (implied by LocalSystem privilege reference)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations; requires local access to exploit

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with LocalSystem privileges leading to malware installation, data destruction, and persistent backdoor establishment.

🟠

Likely Case

Local privilege escalation allowing attackers to gain SYSTEM-level access and potentially install additional payloads or modify system configurations.

🟢

If Mitigated

Limited impact if proper access controls and least privilege principles are already implemented, though the vulnerability still exists.

🌐 Internet-Facing: LOW - This appears to be a local privilege escalation requiring local access to the system.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to gain elevated privileges on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but appears straightforward based on CWE-276 (Incorrect Default Permissions) classification

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisories for specific patched versions

Vendor Advisory: https://www.yrl.com/fwp_support/info/khvu7f00000000q7.html

Restart Required: Yes

Instructions:

1. Review vendor advisories for affected versions. 2. Download and apply the latest patches from official vendor sources. 3. Restart affected systems to complete installation. 4. Verify patch application using version checks.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to affected systems to trusted users only

Implement Least Privilege

windows

Ensure users operate with minimal necessary privileges to reduce impact if exploited

🧯 If You Can't Patch

  • Isolate affected systems from critical network segments
  • Implement strict access controls and monitor for suspicious local privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check installed version against vendor's affected version list in advisories

Check Version:

Check application documentation for version query method; typically through application interface or installation directory properties

Verify Fix Applied:

Verify version number matches or exceeds patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected LocalSystem privilege acquisition
  • Unusual process execution with SYSTEM context
  • Permission modification events on Unifier files

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=4688 AND NewProcessName contains 'unifier' AND SubjectUserName='SYSTEM' AND NOT ParentProcessName contains expected processes

🔗 References

📤 Share & Export