CVE-2024-29500

9.8 CRITICAL

📋 TL;DR

This vulnerability in Secure Lockdown Multi Application Edition's kiosk mode allows attackers to bypass security restrictions and execute arbitrary code via ClickOnce applications. It affects organizations using this software for public-facing kiosks or secure workstations. The high CVSS score indicates critical severity with network-accessible attack vectors.

💻 Affected Systems

Products:
  • Secure Lockdown Multi Application Edition
Versions: v2.00.219
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with kiosk mode enabled. Public-facing kiosks are most at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal sensitive data, pivot to internal networks, and establish persistent access to kiosk systems.

🟠

Likely Case

Attackers bypass kiosk restrictions to run unauthorized applications, potentially accessing local files, installing keyloggers, or using the system as a beachhead for further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, application whitelisting, and ClickOnce restrictions are in place, though kiosk functionality remains compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed exploitation techniques published in referenced blog posts. Attack requires user interaction but can be automated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found in provided references

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates and apply immediately when released.

🔧 Temporary Workarounds

Disable ClickOnce Execution

windows

Block ClickOnce application execution via Group Policy or registry settings

reg add "HKLM\SOFTWARE\Microsoft\.NETFramework\Security\TrustManager\PromptingLevel" /v "MyComputer" /t REG_SZ /d "Disabled" /f
reg add "HKLM\SOFTWARE\Microsoft\.NETFramework\Security\TrustManager\PromptingLevel" /v "LocalIntranet" /t REG_SZ /d "Disabled" /f
reg add "HKLM\SOFTWARE\Microsoft\.NETFramework\Security\TrustManager\PromptingLevel" /v "Internet" /t REG_SZ /d "Disabled" /f

Application Whitelisting

windows

Implement strict application control policies to only allow approved executables

# Configure AppLocker or Windows Defender Application Control policies

🧯 If You Can't Patch

  • Isolate kiosk systems on separate network segments with no internal network access
  • Implement physical security controls to prevent unauthorized access to kiosk interfaces

🔍 How to Verify

Check if Vulnerable:

Check if Secure Lockdown Multi Application Edition version 2.00.219 is installed and kiosk mode is enabled

Check Version:

Check program files directory or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Inteset\Secure Lockdown

Verify Fix Applied:

Test if ClickOnce applications can still execute when kiosk mode is active

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing ClickOnce application execution (Event ID 3000-3010)
  • Unexpected process creation from ClickOnce deployment files (*.application)

Network Indicators:

  • Outbound connections from kiosk systems to unexpected domains
  • Download of ClickOnce manifest files

SIEM Query:

Process Creation where (CommandLine contains ".application" OR Image contains "dfsvc.exe") AND User contains "kiosk"

🔗 References

📤 Share & Export