CVE-2024-24912
📋 TL;DR
This CVE describes a local privilege escalation vulnerability in Check Point Harmony Endpoint Security Client for Windows. An attacker with existing local code execution privileges can exploit this to gain higher system privileges. Only Windows systems running Harmony Endpoint Security Client versions E88.10 and below are affected.
💻 Affected Systems
- Check Point Harmony Endpoint Security Client
📦 What is this software?
Harmony Endpoint by Checkpoint
⚠️ Risk & Real-World Impact
Worst Case
An attacker with initial local access can escalate to SYSTEM/administrator privileges, potentially gaining full control of the endpoint, installing persistent malware, or accessing sensitive data.
Likely Case
Malware or malicious users with local access could bypass security controls, disable endpoint protection, or maintain persistence on compromised systems.
If Mitigated
With proper patch management and least privilege principles, impact is limited to isolated systems where initial compromise has already occurred.
🎯 Exploit Status
Exploitation requires local code execution first. The vulnerability itself appears to have low complexity once initial access is achieved.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: E88.20 or later
Vendor Advisory: https://support.checkpoint.com/results/sk/sk182244
Restart Required: Yes
Instructions:
1. Download Harmony Endpoint Security Client version E88.20 or later from Check Point support portal. 2. Deploy the update through your endpoint management system. 3. Restart affected Windows systems to complete installation.
🔧 Temporary Workarounds
Restrict local administrative access
windowsImplement least privilege principles to limit users who can execute local privileged code
Enhanced monitoring for privilege escalation attempts
allMonitor for unusual process creation or privilege escalation patterns
🧯 If You Can't Patch
- Implement strict application control policies to prevent unauthorized local code execution
- Enhance endpoint monitoring for privilege escalation attempts and unusual process behavior
🔍 How to Verify
Check if Vulnerable:
Check Harmony Endpoint client version in Windows Control Panel > Programs and Features. Versions E88.10 or below are vulnerable.
Check Version:
wmic product where name="Harmony Endpoint Security Client" get version
Verify Fix Applied:
Verify Harmony Endpoint client version is E88.20 or later after update installation.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation with elevated privileges
- Harmony Endpoint service manipulation attempts
- Security software tampering events
Network Indicators:
- Not applicable - local exploitation only
SIEM Query:
EventID=4688 AND (NewProcessName contains "harmony" OR ParentProcessName contains "harmony") AND IntegrityLevel change