CVE-2024-38392

9.1 CRITICAL

📋 TL;DR

This vulnerability in Pexip Infinity Connect allows remote attackers to execute arbitrary code by exploiting insufficient authenticity checks when loading resources. Attackers can trick the application into running malicious code, potentially compromising client systems. All users running vulnerable versions of Pexip Infinity Connect are affected.

💻 Affected Systems

Products:
  • Pexip Infinity Connect
Versions: All versions before 1.13.0
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the client application, not the server components. All default installations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution, allowing attackers to install malware, steal data, or pivot to other systems.

🟠

Likely Case

Client-side compromise leading to data theft, credential harvesting, or installation of persistent backdoors on user devices.

🟢

If Mitigated

Limited impact with proper network segmentation and endpoint protection, potentially only affecting isolated client systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description suggests exploitation is straightforward once an attacker can deliver malicious resources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.13.0

Vendor Advisory: https://docs.pexip.com/admin/security_bulletins.htm

Restart Required: Yes

Instructions:

1. Download Pexip Infinity Connect 1.13.0 or later from official sources. 2. Uninstall previous versions. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Network segmentation and filtering

all

Restrict network access to only trusted resources and implement web filtering to block malicious content delivery.

Application control policies

all

Implement application whitelisting to prevent execution of unauthorized code.

🧯 If You Can't Patch

  • Discontinue use of Pexip Infinity Connect until patched
  • Use alternative clients or web-based interfaces if available

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Pexip Infinity Connect. If version is below 1.13.0, the system is vulnerable.

Check Version:

On Windows: Check 'About' in application menu or check installed programs. On macOS/Linux: Check application information or package manager.

Verify Fix Applied:

Confirm Pexip Infinity Connect version is 1.13.0 or higher after installation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from Pexip Infinity Connect
  • Network connections to suspicious domains from the application

Network Indicators:

  • Unexpected outbound connections from Pexip clients
  • Downloads from untrusted sources triggered by the application

SIEM Query:

process_name:"Pexip Infinity Connect" AND (process_execution:unusual OR network_connection:suspicious)

🔗 References

📤 Share & Export