CVE-2024-4454
📋 TL;DR
This vulnerability in WithSecure Elements Endpoint Protection allows local attackers to escalate privileges to SYSTEM level by exploiting a symbolic link issue in the plugin hosting service. It requires administrator interaction to trigger, affecting installations where the vulnerable service is running. Attackers can execute arbitrary code with highest privileges once exploited.
💻 Affected Systems
- WithSecure Elements Endpoint Protection
📦 What is this software?
Client Security by Withsecure
Server Security by Withsecure
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.
Likely Case
Local privilege escalation leading to unauthorized administrative access, data exfiltration, and installation of additional payloads on the compromised host.
If Mitigated
Limited impact due to proper access controls, monitoring, and the requirement for administrator interaction to trigger the exploit.
🎯 Exploit Status
Exploitation requires local access and administrator interaction. The vulnerability involves symbolic link manipulation in the plugin hosting service.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in available references; check WithSecure advisory for exact version
Vendor Advisory: https://www.withsecure.com/en/support/security-advisories
Restart Required: Yes
Instructions:
1. Check WithSecure security advisory for patch details. 2. Update WithSecure Elements Endpoint Protection to the latest version. 3. Restart affected systems to ensure patch is applied.
🔧 Temporary Workarounds
Restrict Symbolic Link Creation
windowsImplement policies to restrict creation of symbolic links by non-administrative users
Use Group Policy to configure Windows symbolic link settings
Monitor Plugin Hosting Service
windowsImplement enhanced monitoring of the WithSecure plugin hosting service for suspicious activity
🧯 If You Can't Patch
- Implement strict access controls to limit local access to sensitive systems
- Enable detailed logging and monitoring for symbolic link creation and plugin service activities
🔍 How to Verify
Check if Vulnerable:
Check WithSecure Elements Endpoint Protection version against patched version in vendor advisory
Check Version:
Check WithSecure client interface or consult vendor documentation for version check command
Verify Fix Applied:
Verify WithSecure software is updated to patched version and restart system
📡 Detection & Monitoring
Log Indicators:
- Unusual symbolic link creation events
- Suspicious activity in WithSecure plugin hosting service logs
- Privilege escalation attempts
Network Indicators:
- Unusual outbound connections from systems running WithSecure after local access
SIEM Query:
EventID=4688 AND ProcessName LIKE '%WithSecure%' AND CommandLine CONTAINS 'symlink' OR EventID=4656 AND ObjectName LIKE '%WithSecure%'