CVE-2024-36056

5.4 MEDIUM

📋 TL;DR

This vulnerability in Marvin Test HW.exe allows unprivileged user-mode processes to map physical memory through a specific IOCTL in the Hw64.sys driver, enabling privilege escalation to SYSTEM level. It affects users of Marvin Test HW.exe versions before 5.0.5.0 on Windows systems where the driver is loaded.

💻 Affected Systems

Products:
  • Marvin Test HW.exe
Versions: Versions before 5.0.5.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Hw64.sys driver to be loaded, which typically occurs when Marvin Test HW.exe is running or the driver is installed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full SYSTEM privileges on the target system, enabling complete compromise, data theft, persistence establishment, and lateral movement.

🟠

Likely Case

Local privilege escalation from a limited user account to SYSTEM, allowing installation of malware, credential dumping, and bypassing security controls.

🟢

If Mitigated

Limited impact if proper access controls prevent unprivileged users from executing code or if the driver isn't loaded.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access or code execution first.
🏢 Internal Only: HIGH - Malicious insiders or compromised user accounts could exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to send IOCTL to the driver, but the technique is well-documented for similar driver vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.5.0

Vendor Advisory: https://www.marvintest.com/KnowledgeBase/KBArticle.aspx?ID=362

Restart Required: Yes

Instructions:

1. Download Marvin Test HW.exe version 5.0.5.0 or later from vendor website. 2. Install the update following vendor instructions. 3. Restart the system to ensure the updated driver loads.

🔧 Temporary Workarounds

Disable or remove Hw64.sys driver

windows

Prevent the vulnerable driver from loading by disabling or removing it

sc stop Hw64
sc delete Hw64
reg delete "HKLM\SYSTEM\CurrentControlSet\Services\Hw64" /f

Restrict driver access permissions

windows

Modify driver object permissions to prevent unprivileged access

icacls "C:\Windows\System32\drivers\Hw64.sys" /deny *S-1-1-0:(RX)

🧯 If You Can't Patch

  • Implement strict access controls to prevent unprivileged users from executing code on affected systems
  • Monitor for suspicious driver interactions and IOCTL calls to Hw64.sys

🔍 How to Verify

Check if Vulnerable:

Check Marvin Test HW.exe version (should be < 5.0.5.0) and verify Hw64.sys driver is present in system32\drivers

Check Version:

wmic datafile where name="C:\\Program Files\\Marvin Test\\HW.exe" get version

Verify Fix Applied:

Verify Marvin Test HW.exe version is 5.0.5.0 or higher and check driver timestamp

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4697: Service installation for Hw64
  • Driver load events for Hw64.sys
  • Process creation events for Marvin Test HW.exe

Network Indicators:

  • N/A - Local exploitation only

SIEM Query:

DeviceProcessEvents | where FileName contains "HW.exe" | where FolderPath contains "Marvin Test" | where Version < "5.0.5.0"

🔗 References

📤 Share & Export