CVE-2024-45769

5.5 MEDIUM

📋 TL;DR

This vulnerability in Performance Co-Pilot (PCP) allows attackers to send specially crafted data that could cause the program to crash or misbehave. It affects systems running vulnerable versions of PCP, primarily Linux systems using Red Hat distributions. The vulnerability stems from an out-of-bounds write (CWE-787) with medium severity.

💻 Affected Systems

Products:
  • Performance Co-Pilot (PCP)
Versions: Specific versions not detailed in references, but Red Hat advisories indicate multiple affected versions across RHEL 7, 8, and 9
Operating Systems: Linux (specifically Red Hat Enterprise Linux variants)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects PCP installations on RHEL 7, 8, and 9 as indicated by multiple RHSA advisories. Default PCP configurations may be vulnerable if the service is running.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Potential denial of service through application crash, with possible escalation to arbitrary code execution if the out-of-bounds write can be controlled precisely.

🟠

Likely Case

Denial of service through PCP service crash, disrupting performance monitoring capabilities.

🟢

If Mitigated

Minimal impact if network access is restricted and PCP is not exposed to untrusted users.

🌐 Internet-Facing: MEDIUM - PCP services exposed to internet could be targeted for DoS attacks.
🏢 Internal Only: LOW - Internal exploitation requires network access to PCP ports and would primarily affect monitoring functions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted data to PCP services. No public exploit code identified, but the vulnerability type suggests potential for weaponization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check specific RHSA advisories for version details

Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:6837

Restart Required: Yes

Instructions:

1. Update PCP packages using your distribution's package manager. 2. For RHEL: 'yum update pcp*' or 'dnf update pcp*'. 3. Restart PCP services: 'systemctl restart pmcd' and other PCP services. 4. Verify the update with 'rpm -q pcp' or 'dnf list installed pcp*'.

🔧 Temporary Workarounds

Restrict Network Access

linux

Limit access to PCP services (default port 44321) to trusted networks only

firewall-cmd --permanent --remove-service=pcp
firewall-cmd --reload
iptables -A INPUT -p tcp --dport 44321 -j DROP

Disable PCP Services

linux

Temporarily disable PCP services if not required

systemctl stop pmcd
systemctl disable pmcd
systemctl stop pmlogger
systemctl disable pmlogger

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PCP services from untrusted networks
  • Monitor PCP service logs for crash events or unusual connection attempts

🔍 How to Verify

Check if Vulnerable:

Check PCP version against Red Hat advisories: 'rpm -q pcp' or 'dnf list installed pcp*'

Check Version:

rpm -q pcp pcp-libs pcp-conf || dnf list installed pcp*

Verify Fix Applied:

Verify updated package version and ensure PCP services are running without crashes: 'systemctl status pmcd'

📡 Detection & Monitoring

Log Indicators:

  • PCP service crashes in system logs
  • Unexpected restarts of pmcd service
  • Error messages related to memory corruption in PCP logs

Network Indicators:

  • Unusual traffic to PCP port 44321
  • Multiple connection attempts to PCP services from single sources

SIEM Query:

source="systemd" "pmcd" (crashed OR failed OR segmentation fault) OR destination_port=44321 AND protocol="tcp"

🔗 References

📤 Share & Export