CVE-2024-5928

7.8 HIGH

📋 TL;DR

This vulnerability in VIPRE Advanced Security's Patch Management Agent allows local attackers to escalate privileges by exploiting symbolic link handling. Attackers with initial low-privileged access can delete files and execute arbitrary code as SYSTEM. Affects installations of VIPRE Advanced Security with the vulnerable PMAgent component.

💻 Affected Systems

Products:
  • VIPRE Advanced Security
Versions: Versions prior to February 27, 2024 release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Patch Management Agent component; typical installations include this component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM-level code execution, enabling persistence, data theft, and lateral movement.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install malware, or access sensitive system resources.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege, and monitoring prevent initial low-privileged code execution.

🌐 Internet-Facing: LOW - Requires local access; not directly exploitable over network.
🏢 Internal Only: HIGH - Local attackers or malware with initial foothold can exploit to gain SYSTEM privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local low-privileged access first; symbolic link manipulation is well-understood technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: February 27, 2024 release

Vendor Advisory: https://success.vipre.com/en_US/home-windows-release-notes/home-windows-release-notes-20240227

Restart Required: Yes

Instructions:

1. Open VIPRE Advanced Security console. 2. Check for updates. 3. Apply February 27, 2024 update. 4. Restart system to complete installation.

🔧 Temporary Workarounds

Disable Patch Management Agent

windows

Temporarily disable vulnerable component until patching possible

Stop-Service -Name PMAgent
Set-Service -Name PMAgent -StartupType Disabled

Restrict symbolic link creation

windows

Apply Windows policies to limit symbolic link creation to administrators

secedit /export /cfg secpol.cfg
Edit secpol.cfg to set 'Create symbolic links' to Administrators only
secedit /configure /db secpol.sdb /cfg secpol.cfg

🧯 If You Can't Patch

  • Implement strict least privilege principles to prevent initial low-privileged code execution
  • Deploy application control/whitelisting to block unauthorized processes from running

🔍 How to Verify

Check if Vulnerable:

Check VIPRE version in About dialog or registry: HKEY_LOCAL_MACHINE\SOFTWARE\VIPRE\Version

Check Version:

reg query "HKLM\SOFTWARE\VIPRE" /v Version

Verify Fix Applied:

Verify version is February 27, 2024 or later and PMAgent service is running updated version

📡 Detection & Monitoring

Log Indicators:

  • Unexpected PMAgent process behavior
  • Symbolic link creation events in Windows security logs
  • File deletion attempts by PMAgent

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=4688 AND ProcessName="PMAgent.exe" AND CommandLine LIKE "%delete%" OR EventID=4656 AND ObjectName LIKE "%symlink%"

🔗 References

📤 Share & Export