CVE-2024-31201

6.5 MEDIUM

📋 TL;DR

This vulnerability involves an unquoted search path in the ThermoscanIP_Scrutation service, allowing attackers to execute arbitrary code by placing malicious executables in directories with higher permissions. It affects systems running vulnerable versions of the ThermoscanIP software where the service path is improperly configured. Local attackers could exploit this to escalate privileges on compromised machines.

💻 Affected Systems

Products:
  • ThermoscanIP_Scrutation service
Versions: Specific versions not detailed in reference; likely all versions with vulnerable configuration
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the service to be installed with an unquoted path containing spaces and writable directories in the search path.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to SYSTEM/root, enabling complete control over the affected machine.

🟠

Likely Case

Local privilege escalation allowing attackers to gain higher privileges than their initial access level.

🟢

If Mitigated

Limited impact with proper file permissions and service hardening preventing unauthorized file placement.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring initial access to the system.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this to escalate privileges on vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to write to directories in the search path before the legitimate executable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-31201

Restart Required: Yes

Instructions:

1. Review vendor advisory for specific patch details. 2. Apply any available updates. 3. Restart affected services/systems.

🔧 Temporary Workarounds

Quote Service Path

windows

Modify the service configuration to use quoted paths in the executable path.

sc config "ThermoscanIP_Scrutation" binPath="\"C:\Path\To\Service.exe\"" arguments

Restrict Directory Permissions

windows

Remove write permissions from directories in the service search path.

icacls "C:\Program Files" /deny Everyone:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict file system permissions on directories in the service path
  • Monitor for unauthorized file creation in system directories

🔍 How to Verify

Check if Vulnerable:

Check service configuration: sc qc "ThermoscanIP_Scrutation" and verify if BINARY_PATH_NAME contains unquoted paths with spaces.

Check Version:

Check service properties or consult vendor documentation for version information.

Verify Fix Applied:

Confirm service path is properly quoted and directory permissions are restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service restarts
  • File creation events in system directories
  • Process execution from unusual locations

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=4688 AND (NewProcessName contains "ThermoscanIP" OR ParentProcessName contains "ThermoscanIP")

🔗 References

📤 Share & Export