CVE-2024-6055

4.7 MEDIUM

📋 TL;DR

This vulnerability in Devolutions Remote Desktop Manager allows attackers who obtain exported configuration files to recover PowerShell credentials stored in data sources. It affects Windows users running version 2024.1.32.0 or earlier. The issue stems from improper removal of sensitive information during data export.

💻 Affected Systems

Products:
  • Devolutions Remote Desktop Manager
Versions: 2024.1.32.0 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where PowerShell credentials are configured in data sources and configuration files are exported.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to PowerShell credentials, potentially leading to lateral movement, privilege escalation, and complete domain compromise if credentials have high privileges.

🟠

Likely Case

Credential theft from exported configuration files, enabling unauthorized access to systems managed through Remote Desktop Manager.

🟢

If Mitigated

Limited impact with proper access controls on exported files and credential rotation.

🌐 Internet-Facing: LOW - Requires access to exported configuration files, which typically aren't internet-exposed.
🏢 Internal Only: MEDIUM - Internal attackers or malware with file access could exploit this to steal credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simply requires access to exported configuration files.

Exploitation requires physical or logical access to exported configuration files containing sensitive data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.1.33.0 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2024-0008

Restart Required: Yes

Instructions:

1. Download and install Remote Desktop Manager version 2024.1.33.0 or newer from Devolutions website. 2. Restart the application. 3. Verify the update by checking Help > About.

🔧 Temporary Workarounds

Disable data source export feature

windows

Prevent export of configuration files containing sensitive data.

Secure exported configuration files

windows

Apply strict access controls and encryption to any exported configuration files.

🧯 If You Can't Patch

  • Rotate all PowerShell credentials stored in Remote Desktop Manager data sources.
  • Implement strict access controls on exported configuration files and monitor for unauthorized access.

🔍 How to Verify

Check if Vulnerable:

Check Remote Desktop Manager version via Help > About. If version is 2024.1.32.0 or earlier, the system is vulnerable.

Check Version:

Not applicable - check via application GUI Help > About menu.

Verify Fix Applied:

Verify version is 2024.1.33.0 or later via Help > About. Test data source export to confirm sensitive information is properly removed.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to exported configuration files
  • Failed attempts to access PowerShell credentials from exported files

Network Indicators:

  • Unusual PowerShell credential usage from systems not managed by Remote Desktop Manager

SIEM Query:

EventID=4663 AND ObjectName LIKE '%rdm_export%' AND AccessMask='0x10000'

🔗 References

📤 Share & Export