CVE-2024-29720

5.5 MEDIUM

📋 TL;DR

This vulnerability in Sciter's video rendering function allows a local attacker to access sensitive information through the adopt component. It affects applications using Sciter v.4.4.7.0 for UI rendering, potentially exposing memory contents or application data to local users.

💻 Affected Systems

Products:
  • Terra Informatica Software, Inc Sciter
Versions: v.4.4.7.0
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any application using Sciter SDK v.4.4.7.0 for UI rendering. The vulnerability is in the core Sciter library.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains access to sensitive application data, credentials, or memory contents that could lead to further system compromise.

🟠

Likely Case

Local user accesses limited sensitive information from the application's memory or configuration data.

🟢

If Mitigated

Information exposure limited to non-critical data due to proper access controls and application hardening.

🌐 Internet-Facing: LOW - This is a local-only vulnerability requiring local access to the system.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this to gain sensitive information from affected applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. No public exploit code has been identified in the reference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v.4.4.8.0 or later

Vendor Advisory: https://github.com/sciter-sdk/rust-sciter/issues/143

Restart Required: Yes

Instructions:

1. Update Sciter SDK to v.4.4.8.0 or later. 2. Rebuild any applications using Sciter. 3. Redeploy updated applications. 4. Restart affected applications.

🔧 Temporary Workarounds

Restrict local access

all

Limit local user access to systems running vulnerable Sciter applications

Application sandboxing

all

Run Sciter applications in sandboxed/isolated environments

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can run affected applications
  • Monitor for unusual local process activity or memory access patterns

🔍 How to Verify

Check if Vulnerable:

Check Sciter version in application dependencies or linked libraries. If using v.4.4.7.0, the system is vulnerable.

Check Version:

Check application documentation or build configuration for Sciter SDK version

Verify Fix Applied:

Verify Sciter version is v.4.4.8.0 or later in application dependencies and linked libraries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual local process memory access patterns
  • Multiple failed attempts to access protected memory regions

Network Indicators:

  • None - this is a local-only vulnerability

SIEM Query:

Process monitoring for unusual memory access patterns in Sciter-based applications

🔗 References

📤 Share & Export