CVE-2024-50307

5.5 MEDIUM

📋 TL;DR

This vulnerability in Chatwork Desktop Application for Windows allows attackers to execute arbitrary code if users click specially crafted links. Attackers can download and execute malicious files from external websites, potentially compromising the user's device. Only Windows users running Chatwork Desktop Application versions before 2.9.2 are affected.

💻 Affected Systems

Products:
  • Chatwork Desktop Application
Versions: Versions prior to 2.9.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows desktop application, not web or mobile versions. Requires user interaction (clicking a malicious link).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the device, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Malware installation leading to credential theft, data exfiltration, or system disruption for individual users.

🟢

If Mitigated

Limited impact with only isolated user systems affected if proper endpoint protection and user awareness training are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (clicking a link) but is technically simple once the user is tricked.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.2

Vendor Advisory: https://jvn.jp/en/jp/JVN78335885/

Restart Required: Yes

Instructions:

1. Open Chatwork Desktop Application. 2. Go to Settings > About. 3. Check current version. 4. If below 2.9.2, download and install the latest version from official Chatwork website. 5. Restart the application.

🔧 Temporary Workarounds

Disable automatic execution of downloaded files

windows

Configure Windows to prompt before opening downloaded files

Use web version temporarily

all

Switch to Chatwork web interface until desktop application is patched

🧯 If You Can't Patch

  • Implement application control to block execution of unauthorized files
  • Deploy endpoint detection and response (EDR) with file execution monitoring

🔍 How to Verify

Check if Vulnerable:

Open Chatwork Desktop Application, go to Settings > About, check if version is below 2.9.2

Check Version:

Not applicable - check through application GUI

Verify Fix Applied:

Confirm version shows 2.9.2 or higher in Settings > About

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file downloads from external sources
  • Unusual process execution following link clicks in Chatwork

Network Indicators:

  • Outbound connections to unknown domains following Chatwork link clicks
  • File downloads from suspicious external sources

SIEM Query:

Process creation events from Chatwork.exe followed by network connections to external domains and file write operations

🔗 References

📤 Share & Export