CVE-2024-24912

6.7 MEDIUM

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Check Point Harmony Endpoint Security Client for Windows. An attacker with existing local code execution privileges can exploit this to gain higher system privileges. Only Windows systems running Harmony Endpoint Security Client versions E88.10 and below are affected.

💻 Affected Systems

Products:
  • Check Point Harmony Endpoint Security Client
Versions: E88.10 and below
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of Harmony Endpoint. Requires attacker to already have local code execution capability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with initial local access can escalate to SYSTEM/administrator privileges, potentially gaining full control of the endpoint, installing persistent malware, or accessing sensitive data.

🟠

Likely Case

Malware or malicious users with local access could bypass security controls, disable endpoint protection, or maintain persistence on compromised systems.

🟢

If Mitigated

With proper patch management and least privilege principles, impact is limited to isolated systems where initial compromise has already occurred.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring existing local access, not directly exploitable over the network.
🏢 Internal Only: MEDIUM - Internal attackers or malware with local execution could exploit this to escalate privileges on vulnerable endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local code execution first. The vulnerability itself appears to have low complexity once initial access is achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: E88.20 or later

Vendor Advisory: https://support.checkpoint.com/results/sk/sk182244

Restart Required: Yes

Instructions:

1. Download Harmony Endpoint Security Client version E88.20 or later from Check Point support portal. 2. Deploy the update through your endpoint management system. 3. Restart affected Windows systems to complete installation.

🔧 Temporary Workarounds

Restrict local administrative access

windows

Implement least privilege principles to limit users who can execute local privileged code

Enhanced monitoring for privilege escalation attempts

all

Monitor for unusual process creation or privilege escalation patterns

🧯 If You Can't Patch

  • Implement strict application control policies to prevent unauthorized local code execution
  • Enhance endpoint monitoring for privilege escalation attempts and unusual process behavior

🔍 How to Verify

Check if Vulnerable:

Check Harmony Endpoint client version in Windows Control Panel > Programs and Features. Versions E88.10 or below are vulnerable.

Check Version:

wmic product where name="Harmony Endpoint Security Client" get version

Verify Fix Applied:

Verify Harmony Endpoint client version is E88.20 or later after update installation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation with elevated privileges
  • Harmony Endpoint service manipulation attempts
  • Security software tampering events

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=4688 AND (NewProcessName contains "harmony" OR ParentProcessName contains "harmony") AND IntegrityLevel change

🔗 References

📤 Share & Export