CVE-2024-6689

7.8 HIGH

📋 TL;DR

This vulnerability allows a local unprivileged user on Windows systems running baramundi Management Agent v23.1.172.0 to escalate privileges to SYSTEM level through the MSI-Installer. This affects organizations using this specific version of baramundi's endpoint management software on Windows.

💻 Affected Systems

Products:
  • baramundi Management Agent
Versions: v23.1.172.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific version mentioned; other versions may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access can gain full SYSTEM privileges, enabling complete control over the system, installation of malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Malicious insiders or attackers who gain initial access through phishing or other means can escalate to SYSTEM to maintain persistence, disable security controls, and access sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts can be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access but appears to be straightforward based on the CWE-749 (Exposed Dangerous Method or Function) classification.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for updated version

Vendor Advisory: https://www.baramundi.com/en-us/security-info/s-2024-01/

Restart Required: Yes

Instructions:

1. Review the vendor advisory at the provided URL. 2. Download and install the patched version from baramundi. 3. Restart affected systems to complete the update.

🔧 Temporary Workarounds

Restrict local user access

windows

Limit local user accounts and implement least privilege principles to reduce attack surface.

Monitor MSI installer processes

windows

Implement monitoring for unusual MSI installer activity by non-privileged users.

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local login capabilities
  • Deploy endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check the baramundi Management Agent version on Windows systems; if it's v23.1.172.0, the system is vulnerable.

Check Version:

Check baramundi agent interface or Windows Programs and Features for version information

Verify Fix Applied:

Verify the agent version has been updated to a patched version after applying the vendor update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual MSI installer processes launched by non-administrative users
  • Privilege escalation events in Windows Security logs

Network Indicators:

  • Unusual outbound connections from systems after local privilege escalation

SIEM Query:

EventID=4688 AND ProcessName LIKE '%msiexec%' AND SubjectUserName NOT IN (administrator, SYSTEM)

🔗 References

📤 Share & Export