CVE-2024-57276

7.3 HIGH

📋 TL;DR

This CVE describes an unquoted service path vulnerability in Electronic Arts Dragon Age Origins 1.05's DAUpdaterSVC service. Attackers with local access can exploit insecure permissions to replace the service executable with malicious code, leading to privilege escalation to SYSTEM level. This affects users running the vulnerable game version on Windows systems.

💻 Affected Systems

Products:
  • Electronic Arts Dragon Age Origins
Versions: 1.05
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of version 1.05. The DAUpdaterSVC service runs with SYSTEM privileges and has insecure permissions on its service path.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, allowing complete control over the affected machine, installation of persistent malware, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM, enabling installation of additional malware, credential theft, and bypassing security controls.

🟢

If Mitigated

Limited impact with proper access controls, where standard users cannot modify service paths and endpoint protection blocks unauthorized executable creation.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Attackers with initial access to a standard user account can escalate to SYSTEM privileges, posing significant internal threat.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of Windows service manipulation. The vulnerability is well-documented but no public exploit code is confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version beyond 1.05

Vendor Advisory: No official vendor advisory found in provided references

Restart Required: No

Instructions:

1. Launch Dragon Age Origins game client. 2. Check for available updates through the game's update mechanism. 3. Apply any available patches. 4. Verify the game version is updated beyond 1.05.

🔧 Temporary Workarounds

Secure Service Permissions

Windows

Modify DACL on the DAUpdaterSVC service to restrict write permissions to administrators only

sc sdset DAUpdaterSVC D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

Quote Service Path

Windows

Modify the service configuration to use quoted paths in the service binary path

sc config DAUpdaterSVC binPath= "\"C:\Program Files\Dragon Age\bin_ship\DAUpdaterSVC.exe\""

🧯 If You Can't Patch

  • Disable the DAUpdaterSVC service if not required for game functionality
  • Implement strict access controls to prevent standard users from modifying service paths or creating executables in vulnerable directories

🔍 How to Verify

Check if Vulnerable:

Check if Dragon Age Origins version 1.05 is installed and the DAUpdaterSVC service has an unquoted path with weak permissions: sc qc DAUpdaterSVC

Check Version:

Check game properties or launcher for version information

Verify Fix Applied:

Verify game version is updated beyond 1.05 and check service configuration: sc qc DAUpdaterSVC shows quoted path and proper permissions

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing service configuration changes (Event ID 7040)
  • Unexpected service restarts or failures for DAUpdaterSVC
  • Creation of executable files in Dragon Age installation directories by non-admin users

Network Indicators:

  • No specific network indicators as this is a local privilege escalation

SIEM Query:

Windows Event ID 7040 with Service Name containing 'DAUpdaterSVC' OR Process Creation events with Parent Process containing 'services.exe' and Image containing paths in Dragon Age directories

🔗 References

📤 Share & Export