CVE-2024-6354

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated users in Devolutions Remote Desktop Manager to bypass execute permissions through the PAM dashboard. Attackers with valid credentials can perform unauthorized actions they shouldn't have permission to execute. This affects all Windows users running Remote Desktop Manager 2024.2.11 or earlier.

💻 Affected Systems

Products:
  • Devolutions Remote Desktop Manager
Versions: 2024.2.11 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Windows version. Requires authenticated user access to the PAM dashboard feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could execute privileged operations, access sensitive credentials, modify configurations, or potentially pivot to other systems through the compromised PAM dashboard.

🟠

Likely Case

Malicious insiders or compromised accounts bypass permission controls to access or modify privileged credentials and connections they shouldn't have access to.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized access attempts would be detected and logged, limiting damage to isolated credential exposure.

🌐 Internet-Facing: LOW - This requires authenticated access to the Remote Desktop Manager application, which typically isn't directly internet-facing.
🏢 Internal Only: HIGH - This poses significant risk in internal environments where attackers could use compromised credentials or malicious insiders to bypass permission controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but appears straightforward once authenticated. No public exploit code has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.2.12 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2024-0010

Restart Required: Yes

Instructions:

1. Download and install Remote Desktop Manager 2024.2.12 or later from the Devolutions website. 2. Close all Remote Desktop Manager instances. 3. Run the installer. 4. Restart the application after installation completes.

🔧 Temporary Workarounds

Restrict PAM Dashboard Access

windows

Temporarily disable or restrict access to the PAM dashboard feature for non-administrative users.

Implement Least Privilege

all

Review and tighten user permissions, ensuring users only have necessary access rights.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all PAM dashboard usage for suspicious activity.
  • Segment network access to limit potential lateral movement if credentials are compromised.

🔍 How to Verify

Check if Vulnerable:

Check the application version in Help > About. If version is 2024.2.11 or earlier, the system is vulnerable.

Check Version:

In Remote Desktop Manager: Help > About

Verify Fix Applied:

Verify the version is 2024.2.12 or later in Help > About. Test that authenticated users cannot bypass execute permissions in PAM dashboard.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PAM dashboard access patterns
  • Failed permission checks followed by successful operations
  • Users accessing resources outside their normal permissions

Network Indicators:

  • Unusual connection patterns from RDM clients to managed systems

SIEM Query:

source="rdm_logs" AND (event="permission_bypass" OR event="unauthorized_access")

🔗 References

📤 Share & Export