CVE-2024-50591

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Elefant Update Service where an attacker with local access can execute arbitrary commands as SYSTEM via command injection. The vulnerability affects medical office computers running Elefant Software Updater. Attackers can gain full system control by sending crafted messages to the named pipe service.

💻 Affected Systems

Products:
  • Elefant Software Updater (ESU)
Versions: All versions prior to patch (specific version information not provided in CVE)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Elefant Update Service to be installed and running. Medical office environments are primary targets.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing installation of persistent malware, credential theft, lateral movement, and data exfiltration from medical systems.

🟠

Likely Case

Local attacker gains SYSTEM privileges to install keyloggers, ransomware, or backdoors on medical office computers, potentially accessing sensitive patient data.

🟢

If Mitigated

With proper network segmentation and least privilege, impact limited to single workstation, though SYSTEM access still allows significant local damage.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over internet.
🏢 Internal Only: HIGH - Any local user (including low-privilege accounts) can exploit this to gain SYSTEM privileges on affected medical workstations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access but no authentication to the service. Public disclosure includes technical details making weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in CVE details

Vendor Advisory: https://hasomed.de/produkte/elefant/

Restart Required: Yes

Instructions:

1. Contact Hasomed vendor for patched version
2. Install updated Elefant Software Updater
3. Restart affected systems
4. Verify service is running patched version

🔧 Temporary Workarounds

Disable Elefant Update Service

windows

Stop and disable the vulnerable service to prevent exploitation

sc stop "Elefant Update Service"
sc config "Elefant Update Service" start= disabled

Restrict Named Pipe Access

windows

Apply Windows security policies to restrict access to the vulnerable named pipe

icacls "\\.\pipe\ElefantUpdatePipe" /deny Everyone:(F)
Note: Pipe name may vary - check actual pipe name first

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate medical workstations
  • Apply principle of least privilege and monitor for unusual SYSTEM privilege usage

🔍 How to Verify

Check if Vulnerable:

Check if Elefant Update Service is running: sc query "Elefant Update Service" and check version if possible

Check Version:

Check with vendor-specific version check or examine installed program version

Verify Fix Applied:

Verify service is updated to patched version and test command injection is no longer possible

📡 Detection & Monitoring

Log Indicators:

  • Unusual SYSTEM privilege escalation events
  • Process creation from Elefant Update Service with unexpected command lines
  • Named pipe communication anomalies

Network Indicators:

  • Local named pipe communication patterns to Elefant service

SIEM Query:

Process Creation where ParentImage contains "Elefant" AND CommandLine contains suspicious patterns (cmd.exe, powershell, etc)

🔗 References

📤 Share & Export