CVE-2024-7241

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on Panda Security Dome installations by exploiting a link following flaw in the PSANHost service. Attackers with initial low-privileged access can create junctions to write arbitrary files and gain SYSTEM-level code execution. Only Panda Security Dome users are affected.

💻 Affected Systems

Products:
  • Panda Security Dome
Versions: Specific versions not detailed in provided references, but likely multiple versions prior to patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Panda Security Dome installation with PSANHost service running. The vulnerability is in the security software itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation leading to administrative control of the affected endpoint, potentially enabling further attacks within the environment.

🟢

If Mitigated

Limited impact if proper endpoint security controls prevent initial low-privileged code execution and privilege escalation attempts are monitored.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring existing local access to exploit.
🏢 Internal Only: HIGH - Once an attacker gains initial foothold on a vulnerable system, they can escalate to SYSTEM privileges for complete control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing low-privileged access. The vulnerability has been assigned ZDI-CAN-23375 and published by Zero Day Initiative, suggesting potential exploit development.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Panda Security Dome updates for specific version

Vendor Advisory: https://www.pandasecurity.com/en/support/card?id=100066

Restart Required: Yes

Instructions:

1. Open Panda Security Dome console. 2. Check for available updates. 3. Apply the latest security update. 4. Restart affected systems to ensure PSANHost service runs patched version.

🔧 Temporary Workarounds

Restrict PSANHost Service Permissions

windows

Modify PSANHost service permissions to prevent low-privileged users from interacting with it

sc sdset PSANHost D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

Disable PSANHost Service

windows

Temporarily disable the vulnerable service if not critically needed

sc config PSANHost start= disabled
sc stop PSANHost

🧯 If You Can't Patch

  • Implement strict endpoint security controls to prevent initial low-privileged code execution
  • Monitor for suspicious junction creation and PSANHost service activity using EDR/SIEM tools

🔍 How to Verify

Check if Vulnerable:

Check Panda Security Dome version and compare against patched versions in vendor advisory. Also verify PSANHost service is running.

Check Version:

Check Panda Dome interface or installed programs list for version information

Verify Fix Applied:

Verify Panda Security Dome is updated to latest version and PSANHost service shows updated file version/timestamp.

📡 Detection & Monitoring

Log Indicators:

  • Unusual junction/symlink creation events
  • PSANHost service writing to unexpected locations
  • Process creation from PSANHost with SYSTEM privileges

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=4688 AND NewProcessName="*PSANHost*" AND SubjectUserName!="SYSTEM" AND TokenElevationType="%%1938"

🔗 References

📤 Share & Export