CVE-2024-6147

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on systems running Poly Plantronics Hub by exploiting a symbolic link flaw in the Spokes Update Service. Attackers with initial low-privileged access can delete arbitrary files and execute code as SYSTEM. Affects users of Poly Plantronics Hub software.

💻 Affected Systems

Products:
  • Poly Plantronics Hub
Versions: Specific versions not detailed in advisory, but likely multiple versions prior to patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Poly Plantronics Hub installation with Spokes Update Service running. Local access needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM compromise allowing complete control of the system, installation of persistent malware, credential theft, and lateral movement.

🟠

Likely Case

Local privilege escalation leading to persistence mechanisms, credential harvesting, and installation of additional malicious tools.

🟢

If Mitigated

Limited impact if proper endpoint protection and privilege separation are in place, though local compromise still possible.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly exploitable over network.
🏢 Internal Only: HIGH - Local attackers or malware with initial foothold can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to create symbolic links. ZDI-CAN-18271 identifier suggests detailed research exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Poly/Hewlett Packard Enterprise advisory for specific patched version

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-802/

Restart Required: Yes

Instructions:

1. Check current Poly Plantronics Hub version. 2. Visit Poly/HPE security advisory page. 3. Download and install latest version. 4. Restart system to ensure service updates apply.

🔧 Temporary Workarounds

Disable Spokes Update Service

windows

Temporarily disable the vulnerable service to prevent exploitation

sc config "SpokesUpdateService" start= disabled
sc stop "SpokesUpdateService"

Restrict symbolic link creation

windows

Apply policies to restrict non-admin users from creating symbolic links

secedit /export /cfg config.inf
Edit config.inf to set 'Create symbolic links' to Administrators only
secedit /configure /db config.sdb /cfg config.inf

🧯 If You Can't Patch

  • Remove Poly Plantronics Hub from critical systems
  • Implement strict endpoint detection and response (EDR) to monitor for symbolic link creation and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if Poly Plantronics Hub is installed and Spokes Update Service is running via 'sc query SpokesUpdateService'

Check Version:

Check Poly Plantronics Hub about dialog or installed programs list for version information

Verify Fix Applied:

Verify Poly Plantronics Hub version is updated to patched version and Spokes Update Service is either patched or disabled

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing symbolic link creation by non-admin users
  • Service control manager logs for Spokes Update Service modifications
  • File deletion events in sensitive locations

Network Indicators:

  • No direct network indicators - local exploitation only

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%mklink%' OR CommandLine LIKE '%mklink%') AND SubjectUserName NOT IN ('SYSTEM', 'Administrators')

🔗 References

📤 Share & Export