CVE-2024-50588

9.8 CRITICAL

📋 TL;DR

CVE-2024-50588 allows unauthenticated attackers on the same local network to access the Elefant Firebird database using default credentials, exposing sensitive patient data and credentials. Attackers can also create/overwrite arbitrary files with SYSTEM privileges. Medical offices using Hasomed's Elefant software are affected.

💻 Affected Systems

Products:
  • Hasomed Elefant
Versions: All versions prior to patched version (specific version unknown from references)
Operating Systems: Windows (based on NT AUTHORITY\SYSTEM reference)
Default Config Vulnerable: ⚠️ Yes
Notes: Default credentials are the primary vulnerability vector. Systems must be on the same local network as the attacker.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete patient data breach including medical records and credentials, ransomware deployment with SYSTEM privileges, and permanent system compromise.

🟠

Likely Case

Patient data exfiltration and credential harvesting leading to further system access and potential HIPAA violations.

🟢

If Mitigated

Limited to network reconnaissance if proper segmentation and credential management are implemented.

🌐 Internet-Facing: LOW - Requires local network access, not directly internet exploitable.
🏢 Internal Only: HIGH - Any attacker on the medical office network can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only default credentials and network access. No special tools or skills needed beyond basic database access knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version - check vendor advisory

Vendor Advisory: https://hasomed.de/produkte/elefant/

Restart Required: Yes

Instructions:

1. Contact Hasomed for patched version 2. Backup database and configuration 3. Apply vendor-provided patch 4. Restart Elefant services 5. Change all default credentials

🔧 Temporary Workarounds

Change Default Credentials

all

Immediately change all default Firebird database credentials to strong, unique passwords

ALTER USER SYSDBA PASSWORD 'NewStrongPassword123!';
ALTER USER RDB$ADMIN PASSWORD 'AnotherStrongPassword456!';

Network Segmentation

all

Isolate Elefant systems from general office network using VLANs or firewalls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Elefant systems
  • Deploy host-based firewall rules to restrict database port access to authorized systems only

🔍 How to Verify

Check if Vulnerable:

Attempt to connect to Firebird database on default port 3050 using known default credentials from the local network

Check Version:

Check Elefant software version in application interface or contact vendor

Verify Fix Applied:

Verify connection attempts with default credentials fail and only authorized credentials work

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login from new IPs
  • Unusual database queries or file creation events

Network Indicators:

  • Unexpected connections to Firebird port 3050 from unauthorized IPs
  • Database traffic patterns outside normal hours

SIEM Query:

source="firebird.log" AND (event="authentication success" AND user="SYSDBA" OR user="RDB$ADMIN")

🔗 References

📤 Share & Export