CVE-2024-6975
📋 TL;DR
This vulnerability allows local attackers to escalate privileges on Windows systems running vulnerable versions of Cato Networks SDP Client. Attackers can exploit insecure OpenSSL configuration file handling to execute arbitrary code with SYSTEM privileges. Only organizations using Cato SDP Client on Windows are affected.
💻 Affected Systems
- Cato Networks SDP Client
📦 What is this software?
Cato Client by Catonetworks
⚠️ Risk & Real-World Impact
Worst Case
Full SYSTEM-level compromise of Windows endpoints, enabling complete control over the system, credential theft, lateral movement, and persistence establishment.
Likely Case
Local attackers gaining administrative privileges on workstations, allowing installation of malware, disabling security controls, and accessing sensitive local data.
If Mitigated
Limited impact with proper endpoint security controls, user privilege restrictions, and network segmentation preventing lateral movement.
🎯 Exploit Status
Exploitation requires local access to the Windows system. The vulnerability involves manipulating OpenSSL configuration files to achieve privilege escalation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.10.34 and later
Restart Required: Yes
Instructions:
1. Download Cato SDP Client version 5.10.34 or later from Cato Networks portal. 2. Run the installer with administrative privileges. 3. Restart the system after installation completes.
🔧 Temporary Workarounds
Restrict local user privileges
windowsLimit standard user accounts to prevent local exploitation attempts
Monitor OpenSSL configuration changes
windowsImplement file integrity monitoring on OpenSSL configuration files
🧯 If You Can't Patch
- Implement strict least privilege access controls on all Windows endpoints
- Deploy application whitelisting to prevent unauthorized process execution
🔍 How to Verify
Check if Vulnerable:
Check Cato SDP Client version in Windows Programs and Features or via 'CatoClient.exe --version' command
Check Version:
CatoClient.exe --version
Verify Fix Applied:
Verify installed version is 5.10.34 or higher and check system logs for successful update
📡 Detection & Monitoring
Log Indicators:
- Unauthorized modifications to OpenSSL configuration files
- Unexpected privilege escalation events in Windows Security logs
- Cato SDP Client service restart failures
Network Indicators:
- Unusual outbound connections from elevated processes post-exploitation
SIEM Query:
EventID=4688 AND ProcessName LIKE '%openssl%' AND NewProcessName LIKE '%cmd%' OR EventID=4672 AND AccountName='SYSTEM' from non-system processes