U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-50590

Change History

New CVE Received from SEC Consult Vulnerability Lab 11/08/2024 7:15:14 AM

Action Type Old Value New Value
Added Description

								
							
							
						
Attackers with local access to the medical office computer can 
escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by 
overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is 
writable for all users. In addition, the Elefant installer registers two
 Firebird database services which are running as “NT AUTHORITY\SYSTEM”. 

Path: C:\Elefant1\Firebird_2\bin\fbserver.exe

Path: C:\Elefant1\Firebird_2\bin\fbguard.exe


Both service binaries are user writable. This means that a local 
attacker can rename one of the service binaries, replace the service 
executable with a new executable, and then restart the system. Once the 
system has rebooted, the new service binary is executed as "NT 
AUTHORITY\SYSTEM".
Added CWE

								
							
							
						
SEC Consult Vulnerability Lab CWE-250
Added CWE

								
							
							
						
SEC Consult Vulnerability Lab CWE-276
Added CWE

								
							
							
						
SEC Consult Vulnerability Lab CWE-732
Added Reference

								
							
							
						
SEC Consult Vulnerability Lab https://hasomed.de/produkte/elefant/ [No types assigned]
Added Reference

								
							
							
						
SEC Consult Vulnerability Lab https://r.sec-consult.com/hasomed [No types assigned]