CVE-2024-46465

7.8 HIGH

📋 TL;DR

CRYHOD for Windows up to version 2024.3 has insecure default folder permissions that allow other users on the same system to access technical files. This can enable privilege escalation by misusing these files to perform tasks with higher privileges. Only Windows systems running vulnerable CRYHOD versions are affected.

💻 Affected Systems

Products:
  • CRYHOD for Windows
Versions: Up to and including 2024.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where CRYHOD is installed with default folder permissions. The vulnerability exists in the dedicated folders configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attackers can achieve full system compromise by leveraging the accessible files to execute arbitrary code with elevated privileges.

🟠

Likely Case

Malicious local users or compromised accounts can escalate privileges to gain administrative access on the system.

🟢

If Mitigated

With proper folder permissions configured, the vulnerability cannot be exploited and normal operations continue.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local system access.
🏢 Internal Only: HIGH - Any compromised local account or malicious insider can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.4 or later

Vendor Advisory: https://www.primx.eu/en/bulletins/security-bulletin-24932296/

Restart Required: Yes

Instructions:

1. Download CRYHOD version 2024.4 or later from the vendor. 2. Install the update following vendor instructions. 3. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Secure Folder Permissions

windows

Manually adjust folder permissions to restrict access to CRYHOD dedicated folders to authorized users only.

icacls "C:\Program Files\CRYHOD\dedicated_folders" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "<authorized_user>:(OI)(CI)RX"

🧯 If You Can't Patch

  • Apply the folder permissions workaround immediately to restrict access.
  • Implement strict access controls and monitor for unauthorized access attempts to CRYHOD folders.

🔍 How to Verify

Check if Vulnerable:

Check CRYHOD version in program settings or via 'wmic product where name="CRYHOD" get version' command. If version is 2024.3 or earlier, the system is vulnerable.

Check Version:

wmic product where name="CRYHOD" get version

Verify Fix Applied:

Verify CRYHOD version is 2024.4 or later and check folder permissions on CRYHOD dedicated folders to ensure only authorized users have access.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security logs showing unauthorized access attempts to CRYHOD folders
  • File access audit logs for CRYHOD technical files

Network Indicators:

  • Not applicable - this is a local privilege escalation vulnerability

SIEM Query:

EventID=4663 AND ObjectName LIKE "%CRYHOD%" AND Accesses="ReadData" AND SubjectUserName NOT IN ("SYSTEM", "Administrator", "<authorized_users>")

🔗 References

📤 Share & Export