CVE-2024-42191

6.5 MEDIUM

📋 TL;DR

HCL Traveler for Microsoft Outlook (HTMO) has a COM hijacking vulnerability that allows attackers to replace legitimate application components with malicious ones. This affects users running vulnerable versions of HTMO on Windows systems. Successful exploitation could lead to arbitrary code execution.

💻 Affected Systems

Products:
  • HCL Traveler for Microsoft Outlook
Versions: All versions prior to 12.0.6.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows COM infrastructure and HTMO installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains SYSTEM-level privileges and establishes persistent backdoor access to the entire Windows environment.

🟠

Likely Case

Local attacker escalates privileges and executes arbitrary code with the permissions of the HTMO application.

🟢

If Mitigated

Attack limited to user context with proper application control policies and least privilege enforcement.

🌐 Internet-Facing: LOW - Requires local access or ability to place files on target system.
🏢 Internal Only: MEDIUM - Insider threats or compromised accounts could exploit this locally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to place malicious files in specific locations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.0.6.0

Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120745

Restart Required: Yes

Instructions:

1. Download HTMO version 12.0.6.0 from HCL support portal. 2. Backup current configuration. 3. Run installer with administrative privileges. 4. Restart system after installation completes.

🔧 Temporary Workarounds

Restrict COM object registration

windows

Implement COM hardening via Group Policy to restrict unauthorized COM object registration

Computer Configuration > Administrative Templates > Windows Components > COM+ > Configure COM+ security

Application control policies

windows

Implement AppLocker or Windows Defender Application Control to restrict execution of unauthorized binaries

Computer Configuration > Windows Settings > Security Settings > Application Control Policies

🧯 If You Can't Patch

  • Implement strict least privilege principles for all user accounts
  • Enable Windows Defender Attack Surface Reduction rules and monitor for COM hijacking attempts

🔍 How to Verify

Check if Vulnerable:

Check HTMO version via Control Panel > Programs and Features, look for versions below 12.0.6.0

Check Version:

wmic product where name="HCL Traveler for Microsoft Outlook" get version

Verify Fix Applied:

Verify installed version is 12.0.6.0 or higher in Programs and Features

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: COM+ activation events, unexpected DLL loading, process creation from unusual locations

Network Indicators:

  • Unusual outbound connections from HTMO process, beaconing behavior

SIEM Query:

EventID=4688 AND (NewProcessName="*\HCL Traveler*" OR ParentProcessName="*\HCL Traveler*") AND CommandLine="*COM*"

🔗 References

📤 Share & Export