CVE-2024-6978

5.6 MEDIUM

📋 TL;DR

The Cato Networks Windows SDP Client allows low-privileged users to install local root certificates, potentially enabling man-in-the-middle attacks or credential theft. This affects all Windows systems running SDP Client versions before 5.10.28.

💻 Affected Systems

Products:
  • Cato Networks Windows SDP Client
Versions: All versions before 5.10.28
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of the SDP Client. Requires low-privileged user access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could install malicious root certificates to intercept and decrypt all TLS/SSL traffic, steal credentials, and perform man-in-the-middle attacks against the affected system.

🟠

Likely Case

Malicious users or malware with low privileges could install rogue certificates to intercept specific application traffic or bypass security controls.

🟢

If Mitigated

With proper user privilege management and monitoring, impact is limited to authorized low-privileged users who might misuse this capability.

🌐 Internet-Facing: LOW - This is a local privilege issue requiring user access to the system.
🏢 Internal Only: MEDIUM - Internal users with low privileges could exploit this to bypass security controls or intercept internal traffic.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires low-privileged user access to the Windows system. The vulnerability is straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.10.28 or later

Vendor Advisory: https://support.catonetworks.com/hc/en-us/articles/19767051500957-CVE-2024-6978-Windows-SDP-Client-Local-root-certificates-can-be-installed-with-low-privileged-users

Restart Required: Yes

Instructions:

1. Download SDP Client version 5.10.28 or later from Cato Networks. 2. Install the update on all affected Windows systems. 3. Restart the systems to complete the installation.

🔧 Temporary Workarounds

Restrict certificate installation permissions

windows

Modify Windows permissions to prevent low-privileged users from installing certificates

Use Group Policy or local security policy to restrict certificate store write permissions

Monitor certificate store changes

windows

Implement monitoring for unauthorized certificate installations

Configure Windows Event Log monitoring for Event ID 4107 (Certificate Services Client-Auto-Enrollment)

🧯 If You Can't Patch

  • Implement strict least-privilege access controls to limit which users can access affected systems
  • Deploy certificate monitoring and alerting to detect unauthorized certificate installations

🔍 How to Verify

Check if Vulnerable:

Check SDP Client version in Windows Programs and Features or via command line: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Cato SDP Client*'} | Select-Object Name, Version

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Cato SDP Client*'} | Select-Object Name, Version

Verify Fix Applied:

Verify SDP Client version is 5.10.28 or higher using the same command, and test that low-privileged users cannot install certificates

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Log entries for certificate store modifications (Event ID 4107)
  • Unexpected certificate installations in Trusted Root Certification Authorities store

Network Indicators:

  • Unexpected certificate validation failures
  • TLS/SSL handshake anomalies with internal systems

SIEM Query:

source="Windows Security" EventID=4107 | where CertificateStore="ROOT"

🔗 References

📤 Share & Export