CVE-2024-4454

7.8 HIGH

📋 TL;DR

This vulnerability in WithSecure Elements Endpoint Protection allows local attackers to escalate privileges to SYSTEM level by exploiting a symbolic link issue in the plugin hosting service. It requires administrator interaction to trigger, affecting installations where the vulnerable service is running. Attackers can execute arbitrary code with highest privileges once exploited.

💻 Affected Systems

Products:
  • WithSecure Elements Endpoint Protection
Versions: Specific versions not detailed in advisory; all versions before patch are likely affected
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the WithSecure plugin hosting service to be running. Administrator interaction is needed to trigger the vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation leading to unauthorized administrative access, data exfiltration, and installation of additional payloads on the compromised host.

🟢

If Mitigated

Limited impact due to proper access controls, monitoring, and the requirement for administrator interaction to trigger the exploit.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Internal attackers with local access can exploit this to gain SYSTEM privileges on affected endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and administrator interaction. The vulnerability involves symbolic link manipulation in the plugin hosting service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references; check WithSecure advisory for exact version

Vendor Advisory: https://www.withsecure.com/en/support/security-advisories

Restart Required: Yes

Instructions:

1. Check WithSecure security advisory for patch details. 2. Update WithSecure Elements Endpoint Protection to the latest version. 3. Restart affected systems to ensure patch is applied.

🔧 Temporary Workarounds

Restrict Symbolic Link Creation

windows

Implement policies to restrict creation of symbolic links by non-administrative users

Use Group Policy to configure Windows symbolic link settings

Monitor Plugin Hosting Service

windows

Implement enhanced monitoring of the WithSecure plugin hosting service for suspicious activity

🧯 If You Can't Patch

  • Implement strict access controls to limit local access to sensitive systems
  • Enable detailed logging and monitoring for symbolic link creation and plugin service activities

🔍 How to Verify

Check if Vulnerable:

Check WithSecure Elements Endpoint Protection version against patched version in vendor advisory

Check Version:

Check WithSecure client interface or consult vendor documentation for version check command

Verify Fix Applied:

Verify WithSecure software is updated to patched version and restart system

📡 Detection & Monitoring

Log Indicators:

  • Unusual symbolic link creation events
  • Suspicious activity in WithSecure plugin hosting service logs
  • Privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from systems running WithSecure after local access

SIEM Query:

EventID=4688 AND ProcessName LIKE '%WithSecure%' AND CommandLine CONTAINS 'symlink' OR EventID=4656 AND ObjectName LIKE '%WithSecure%'

🔗 References

📤 Share & Export