CVE-2026-2999

9.8 CRITICAL

📋 TL;DR

CVE-2026-2999 is a critical remote code execution vulnerability in IDExpert Windows Logon Agent that allows unauthenticated attackers to force the system to download and execute arbitrary malicious files from remote sources. This affects all systems running vulnerable versions of IDExpert Windows Logon Agent developed by Changing. Attackers can gain complete control over affected systems without any authentication.

💻 Affected Systems

Products:
  • IDExpert Windows Logon Agent
Versions: Versions prior to 3.0.0.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The agent typically runs with SYSTEM privileges, making exploitation particularly dangerous.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to ransomware deployment, data exfiltration, lateral movement across networks, and persistent backdoor installation.

🟠

Likely Case

Initial foothold for attackers leading to credential theft, malware installation, and network reconnaissance for further attacks.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and endpoint protection blocks malicious downloads.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers on the internet to compromise exposed systems.
🏢 Internal Only: HIGH - Even internally, any network-accessible vulnerable system can be exploited without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description suggests straightforward exploitation requiring only network access to the vulnerable service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.0.1

Vendor Advisory: https://www.changingtec.com/news_detail.jsp?item_id=348

Restart Required: Yes

Instructions:

1. Download version 3.0.0.1 from Changing's official website. 2. Stop the IDExpert Windows Logon Agent service. 3. Install the update. 4. Restart the system. 5. Verify the service is running with the updated version.

🔧 Temporary Workarounds

Network Access Restriction

windows

Block network access to the IDExpert Windows Logon Agent service using firewall rules

netsh advfirewall firewall add rule name="Block IDExpert Agent" dir=in action=block protocol=TCP localport=[PORT_NUMBER]

Service Disablement

windows

Temporarily disable the IDExpert Windows Logon Agent service if not critically needed

sc stop "IDExpert Windows Logon Agent"
sc config "IDExpert Windows Logon Agent" start= disabled

🧯 If You Can't Patch

  • Isolate affected systems in a separate network segment with strict firewall rules
  • Implement application allowlisting to prevent execution of unauthorized binaries

🔍 How to Verify

Check if Vulnerable:

Check the installed version of IDExpert Windows Logon Agent via Control Panel > Programs and Features or by examining the service properties

Check Version:

wmic product where name="IDExpert Windows Logon Agent" get version

Verify Fix Applied:

Verify the version shows 3.0.0.1 or higher and test that the service functions normally after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections from IDExpert agent to external IPs
  • Unexpected process executions following IDExpert service activity
  • Failed update attempts or service restart anomalies

Network Indicators:

  • Outbound connections from IDExpert agent to unknown external servers on non-standard ports
  • HTTP/HTTPS requests to download executable files triggered by the agent

SIEM Query:

source="windows" AND process_name="IDExpert*" AND (destination_ip!=internal_range OR file_download="*.exe")

🔗 References

📤 Share & Export