CVE-2024-24970

6.5 MEDIUM

📋 TL;DR

This vulnerability in HP Display Control software allows local attackers to escalate privileges on affected systems. It affects HP computers with the vulnerable driver component installed. Attackers could gain SYSTEM-level access by exploiting improper privilege management.

💻 Affected Systems

Products:
  • HP Display Control software component within HP Application Enabling Software Driver
Versions: Versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects HP computers where this software component is installed. The vulnerability is in the driver component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing installation of malware, data theft, and persistence mechanisms.

🟠

Likely Case

Local privilege escalation enabling attackers to bypass security controls, install unauthorized software, or access protected system resources.

🟢

If Mitigated

Limited impact if systems are patched, have proper endpoint protection, and follow least privilege principles.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: MEDIUM - Insider threats or compromised user accounts could exploit this to gain elevated privileges within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to the system. No public exploit code has been disclosed as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated version via HP Support Assistant or manual download

Vendor Advisory: https://support.hp.com/us-en/document/ish_10914875-10914901-16/hpsbhf03954

Restart Required: Yes

Instructions:

1. Open HP Support Assistant. 2. Check for updates. 3. Install available updates for HP Application Enabling Software. 4. Restart the computer. Alternatively, download the update manually from HP's support site.

🔧 Temporary Workarounds

Remove vulnerable component

windows

Uninstall the HP Display Control software component if not required

Control Panel > Programs > Uninstall a program > Find 'HP Display Control' or 'HP Application Enabling Software' > Uninstall

🧯 If You Can't Patch

  • Implement strict access controls and limit local administrative privileges
  • Deploy endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check installed programs for HP Display Control or HP Application Enabling Software and verify version against HP's advisory

Check Version:

wmic product get name,version | findstr /i "HP Display Control" or "HP Application Enabling"

Verify Fix Applied:

Verify the software version has been updated through HP Support Assistant or check the installed version matches the patched version

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Suspicious driver loading
  • Process creation with SYSTEM privileges from non-admin users

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=4688 AND NewProcessName contains 'cmd.exe' OR 'powershell.exe' AND SubjectUserName != 'SYSTEM' AND TokenElevationType != '%%1936'

🔗 References

📤 Share & Export