CVE-2024-46992

7.8 HIGH

📋 TL;DR

This CVE describes an ASAR integrity bypass vulnerability in Electron that allows attackers to modify application files and potentially execute arbitrary code. Only affects Windows applications with embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled, and requires attacker write access to the application's filesystem location. macOS applications using these fuses are not impacted.

💻 Affected Systems

Products:
  • Electron
Versions: 30.0.0-alpha.1 to before 30.0.5, 31.0.0-alpha.1 to before 31.0.0-beta.1
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only impacts apps with embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. macOS apps using these fuses are NOT affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains arbitrary code execution by modifying ASAR files, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or application compromise when attacker has write access to application directory, allowing code injection or data manipulation.

🟢

If Mitigated

No impact if fuses are disabled or application is on macOS, or if proper file permissions prevent unauthorized write access.

🌐 Internet-Facing: LOW - Requires local file system write access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal attackers with write access to application directories could exploit this for privilege escalation or persistence.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to have write access to application filesystem location and knowledge of fuse configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 30.0.5 or 31.0.0-beta.1

Vendor Advisory: https://github.com/electron/electron/security/advisories/GHSA-xw5q-g62x-2qjc

Restart Required: Yes

Instructions:

1. Update Electron to version 30.0.5 or 31.0.0-beta.1 or later. 2. Rebuild your application with the updated Electron version. 3. Redeploy the patched application to all affected systems.

🔧 Temporary Workarounds

Disable vulnerable fuses

all

Disable embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses in your Electron app configuration

Modify fuse configuration in your app's main process or package.json to disable these fuses

🧯 If You Can't Patch

  • Restrict file system permissions to prevent unauthorized write access to Electron application directories
  • Implement application allowlisting and monitor for unauthorized modifications to ASAR files

🔍 How to Verify

Check if Vulnerable:

Check Electron version with 'electron -v' or inspect package.json. Verify if embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses are enabled in app configuration.

Check Version:

electron -v or check package.json dependencies

Verify Fix Applied:

Confirm Electron version is 30.0.5 or 31.0.0-beta.1 or later, and verify application still functions with fuses enabled.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected ASAR file modifications
  • Application integrity check failures
  • Unusual process execution from Electron app directory

Network Indicators:

  • None - this is a local file system vulnerability

SIEM Query:

File modification events in Electron application directories, particularly .asar file changes on Windows systems

🔗 References

📤 Share & Export