CVE-2024-50804

7.8 HIGH

📋 TL;DR

This vulnerability allows a local attacker to execute arbitrary code with elevated privileges on systems running MSI Center Pro 2.1.37.0. By exploiting insecure permissions on the Device_DeviceID.dat.bak file, an attacker can write malicious code that gets executed by the application. Only users with local access to affected Windows systems are at risk.

💻 Affected Systems

Products:
  • MSI Center Pro
Versions: 2.1.37.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires MSI Center Pro installation with default permissions on the Data folder.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via privilege escalation to SYSTEM/administrator level, enabling installation of persistent malware, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, or access restricted system resources.

🟢

If Mitigated

Limited impact if proper access controls and least privilege principles are enforced, though local code execution remains possible.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local system access.
🏢 Internal Only: HIGH - Any compromised user account or malware with local execution can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once access is obtained. The referenced GitHub page contains technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check MSI official website for security updates. Uninstall MSI Center Pro 2.1.37.0 if no patch is available.

🔧 Temporary Workarounds

Restrict File Permissions

windows

Modify permissions on the vulnerable file to prevent unauthorized writes

icacls "C:\ProgramData\MSI\One Dragon Center\Data\Device_DeviceID.dat.bak" /deny Everyone:(W)

Remove Vulnerable File

windows

Delete or rename the vulnerable backup file

del "C:\ProgramData\MSI\One Dragon Center\Data\Device_DeviceID.dat.bak"

🧯 If You Can't Patch

  • Uninstall MSI Center Pro 2.1.37.0 completely
  • Implement strict access controls and monitor for unauthorized file modifications in the MSI directory

🔍 How to Verify

Check if Vulnerable:

Check if file exists: C:\ProgramData\MSI\One Dragon Center\Data\Device_DeviceID.dat.bak and verify MSI Center Pro version is 2.1.37.0

Check Version:

Check MSI Center Pro about section or Programs and Features in Control Panel

Verify Fix Applied:

Verify file permissions are restricted or file is removed, and check that MSI Center Pro is either updated or uninstalled

📡 Detection & Monitoring

Log Indicators:

  • File modification events for Device_DeviceID.dat.bak
  • Process creation from MSI Center Pro with unusual parent processes

Network Indicators:

  • Unusual outbound connections from MSI Center Pro processes

SIEM Query:

EventID=4663 OR EventID=4656 AND ObjectName="*Device_DeviceID.dat.bak*"

🔗 References

📤 Share & Export