CVE-2024-5928
📋 TL;DR
This vulnerability in VIPRE Advanced Security's Patch Management Agent allows local attackers to escalate privileges by exploiting symbolic link handling. Attackers with initial low-privileged access can delete files and execute arbitrary code as SYSTEM. Affects installations of VIPRE Advanced Security with the vulnerable PMAgent component.
💻 Affected Systems
- VIPRE Advanced Security
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM-level code execution, enabling persistence, data theft, and lateral movement.
Likely Case
Local privilege escalation allowing attackers to bypass security controls, install malware, or access sensitive system resources.
If Mitigated
Limited impact if proper endpoint protection, least privilege, and monitoring prevent initial low-privileged code execution.
🎯 Exploit Status
Requires local low-privileged access first; symbolic link manipulation is well-understood technique.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: February 27, 2024 release
Vendor Advisory: https://success.vipre.com/en_US/home-windows-release-notes/home-windows-release-notes-20240227
Restart Required: Yes
Instructions:
1. Open VIPRE Advanced Security console. 2. Check for updates. 3. Apply February 27, 2024 update. 4. Restart system to complete installation.
🔧 Temporary Workarounds
Disable Patch Management Agent
windowsTemporarily disable vulnerable component until patching possible
Stop-Service -Name PMAgent
Set-Service -Name PMAgent -StartupType Disabled
Restrict symbolic link creation
windowsApply Windows policies to limit symbolic link creation to administrators
secedit /export /cfg secpol.cfg
Edit secpol.cfg to set 'Create symbolic links' to Administrators only
secedit /configure /db secpol.sdb /cfg secpol.cfg
🧯 If You Can't Patch
- Implement strict least privilege principles to prevent initial low-privileged code execution
- Deploy application control/whitelisting to block unauthorized processes from running
🔍 How to Verify
Check if Vulnerable:
Check VIPRE version in About dialog or registry: HKEY_LOCAL_MACHINE\SOFTWARE\VIPRE\Version
Check Version:
reg query "HKLM\SOFTWARE\VIPRE" /v Version
Verify Fix Applied:
Verify version is February 27, 2024 or later and PMAgent service is running updated version
📡 Detection & Monitoring
Log Indicators:
- Unexpected PMAgent process behavior
- Symbolic link creation events in Windows security logs
- File deletion attempts by PMAgent
Network Indicators:
- None - local exploitation only
SIEM Query:
EventID=4688 AND ProcessName="PMAgent.exe" AND CommandLine LIKE "%delete%" OR EventID=4656 AND ObjectName LIKE "%symlink%"