CVE-2024-6973

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running vulnerable versions of the Cato SDP client by sending specially crafted URLs. It affects all Windows users with Cato SDP Client versions before 5.10.34. Successful exploitation could give attackers full control of the affected system.

💻 Affected Systems

Products:
  • Cato Windows SDP Client
Versions: All versions before 5.10.34
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows clients. The vulnerability is in URL parsing/handling functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining SYSTEM-level privileges, enabling data theft, ransomware deployment, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Initial foothold leading to credential harvesting, data exfiltration, and installation of malware or persistence mechanisms.

🟢

If Mitigated

Limited impact due to network segmentation, endpoint protection, and restricted user privileges preventing full system takeover.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the attacker to send a crafted URL to the vulnerable client, which could be delivered via phishing, malicious websites, or other social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.10.34 or later

Vendor Advisory: https://support.catonetworks.com/hc/en-us/articles/19756987454237-CVE-2024-6973-Windows-SDP-Client-Remote-Code-Execution-via-crafted-URLs

Restart Required: Yes

Instructions:

1. Download Cato SDP Client version 5.10.34 or later from official Cato sources. 2. Run the installer as administrator. 3. Follow installation prompts. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Disable automatic URL handling

windows

Configure the SDP client to not automatically handle URLs or disable URL protocol handlers

Network filtering

all

Block suspicious URLs at network perimeter or endpoint protection level

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Deploy application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check Cato SDP Client version in Windows Programs and Features or via 'Cato SDP Client' in Start Menu > About

Check Version:

Get-ItemProperty HKLM:\Software\Microsoft\Windows\CurrentVersion\Uninstall\* | Where-Object {$_.DisplayName -like '*Cato SDP*'} | Select-Object DisplayName, DisplayVersion

Verify Fix Applied:

Verify installed version is 5.10.34 or higher and test URL handling functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Cato SDP client
  • Suspicious URL parsing errors in application logs
  • Unexpected network connections from SDP client

Network Indicators:

  • Unusual outbound connections from SDP client
  • Suspicious URL patterns in network traffic

SIEM Query:

source="windows" AND (process_name="catosdp.exe" OR parent_process="catosdp.exe") AND (event_id=4688 OR event_id=1)

🔗 References

📤 Share & Export