Skip to main content

CVE-2024-1149: CWE-347 Improper Verification of Cryptographic Signature in Snow Software Inventory Agent

High
VulnerabilityCVE-2024-1149cvecve-2024-1149cwe-347
Published: Thu Feb 08 2024 (02/08/2024, 13:01:03 UTC)
Source: CVE
Vendor/Project: Snow Software
Product: Inventory Agent

Description

Improper Verification of Cryptographic Signature vulnerability in Snow Software Inventory Agent on MacOS, Snow Software Inventory Agent on Windows, Snow Software Inventory Agent on Linux allows File Manipulation through Snow Update Packages.This issue affects Inventory Agent: through 6.12.0; Inventory Agent: through 6.14.5; Inventory Agent: through 6.7.2.

AI-Powered Analysis

AILast updated: 07/04/2025, 19:10:30 UTC

Technical Analysis

CVE-2024-1149 is a high-severity vulnerability affecting the Snow Software Inventory Agent across multiple operating systems including macOS, Windows, and Linux. The root cause is an improper verification of cryptographic signatures (CWE-347) in the update mechanism of the Inventory Agent. This flaw allows an attacker with limited privileges (local access with low privileges) to manipulate files by exploiting Snow Update Packages. Because the cryptographic signature verification is flawed, maliciously crafted update packages could be accepted as legitimate, enabling unauthorized code or file modifications. The vulnerability affects versions through 6.12.0, 6.14.5, and 6.7.2 of the Inventory Agent. The CVSS v3.1 score is 7.8, indicating a high severity with impacts on confidentiality, integrity, and availability. The attack vector is local (AV:L), requiring low privileges (PR:L) but no user interaction (UI:N). The vulnerability scope is unchanged (S:U), meaning the exploit affects only the vulnerable component. Exploitation could lead to full compromise of the Inventory Agent’s functionality, potentially allowing attackers to execute arbitrary code or manipulate inventory data, which could cascade into broader network trust issues or supply chain compromise. No known exploits are currently reported in the wild, but the presence of this vulnerability in a widely deployed asset management agent raises significant concerns.

Potential Impact

For European organizations, the impact of CVE-2024-1149 can be substantial. Snow Software Inventory Agent is commonly used for software asset management and compliance tracking, critical for IT governance and security posture. Exploitation could allow attackers to tamper with inventory data, hide unauthorized software, or deploy malicious payloads under the guise of legitimate updates. This undermines trust in software supply chain integrity and could facilitate lateral movement within enterprise networks. Confidentiality is at risk as attackers might gain access to sensitive inventory data; integrity is compromised due to unauthorized file manipulation; availability could be affected if the agent or dependent systems are destabilized. Given the agent’s presence on endpoints across various industries, including finance, manufacturing, and government sectors in Europe, the vulnerability could disrupt compliance with regulations like GDPR and NIS Directive. Additionally, the local attack vector means that insider threats or attackers who have gained limited footholds could escalate their privileges or persistence.

Mitigation Recommendations

Organizations should immediately verify the version of Snow Software Inventory Agent deployed and prioritize upgrading to patched versions once available from Snow Software. Until patches are released, restrict local access to systems running the Inventory Agent to trusted users only. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor for suspicious update package activities or unauthorized file changes. Implement strict network segmentation to limit lateral movement from compromised endpoints. Review and harden update mechanisms by validating cryptographic signatures independently if possible. Conduct regular audits of software inventory data to detect anomalies that may indicate tampering. Engage with Snow Software support for any interim mitigation guidance and monitor threat intelligence feeds for emerging exploit reports. Finally, incorporate this vulnerability into incident response plans to enable rapid containment if exploitation is detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Snow
Date Reserved
2024-02-01T09:47:48.899Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec3b8

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:10:30 PM

Last updated: 7/31/2025, 1:12:46 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats