CVE-2024-36497

9.1 CRITICAL

📋 TL;DR

CVE-2024-36497 is a critical vulnerability in WINSelect software where decrypted configuration files contain passwords in cleartext. This allows attackers to bypass existing restrictions and completely disable WINSelect security controls. Organizations using WINSelect for application whitelisting and security restrictions are affected.

💻 Affected Systems

Products:
  • Faronics WINSelect
Versions: Specific versions not detailed in references, but appears to affect current versions as of June 2024 disclosure
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in how WINSelect handles configuration file decryption and password storage.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of WINSelect security controls allowing unrestricted access to restricted systems, potential lateral movement within networks, and full bypass of application whitelisting protections.

🟠

Likely Case

Local attackers or users with file access can extract passwords and disable WINSelect restrictions, allowing execution of unauthorized applications and bypassing security policies.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized users who already have system access but could still bypass application restrictions.

🌐 Internet-Facing: LOW - This vulnerability requires local file access or system compromise to exploit, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Internal users with file access or compromised internal systems can exploit this to bypass security controls.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to configuration files but is technically simple once files are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.faronics.com/en-uk/document-library/document/winselect-standard-release-notes

Restart Required: No

Instructions:

Check vendor advisory for updates. Currently no patch available according to disclosure timeline.

🔧 Temporary Workarounds

Restrict Configuration File Access

windows

Apply strict file permissions to WINSelect configuration files to prevent unauthorized access

icacls "C:\Program Files\Faronics\WINSelect\*.cfg" /deny Users:(R)
icacls "C:\ProgramData\Faronics\WINSelect\*.cfg" /deny Users:(R)

Monitor Configuration File Access

windows

Enable auditing and monitoring for access to WINSelect configuration files

auditpol /set /subcategory:"File System" /success:enable /failure:enable

🧯 If You Can't Patch

  • Implement strict access controls on WINSelect configuration directories
  • Monitor for unauthorized access to WINSelect files and investigate any configuration changes

🔍 How to Verify

Check if Vulnerable:

Check if WINSelect configuration files contain cleartext passwords after decryption. Examine configuration files in WINSelect installation and data directories.

Check Version:

Check WINSelect version in Control Panel > Programs and Features or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\Faronics\WINSelect

Verify Fix Applied:

Verify configuration files no longer contain cleartext passwords and are properly encrypted. Test WINSelect functionality remains intact.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to WINSelect configuration files
  • Changes to WINSelect configuration
  • WINSelect service stopping unexpectedly

Network Indicators:

  • Unusual outbound connections from WINSelect-protected systems
  • Traffic patterns indicating bypassed restrictions

SIEM Query:

EventID=4663 AND ObjectName LIKE "%WINSelect%" AND AccessMask=0x1

🔗 References

📤 Share & Export