Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23773: n/a

0
High
VulnerabilityCVE-2024-23773cvecve-2024-23773
Published: Tue Apr 30 2024 (04/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Quest KACE Agent for Windows 12.0.38 and 13.1.23.0. An Arbitrary file delete vulnerability exists in the KSchedulerSvc.exe component. Local attackers can delete any file of their choice with NT Authority\SYSTEM privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:16:58 UTC

Technical Analysis

CVE-2024-23773 is a vulnerability discovered in the Quest KACE Agent for Windows versions 12.0.38 and 13.1.23.0, specifically within the KSchedulerSvc.exe service component. The flaw allows a local attacker with limited privileges to perform arbitrary file deletion on the affected system. The vulnerability arises due to improper validation or restriction of file paths (CWE-22), enabling the attacker to specify and delete any file on the system. Because the KSchedulerSvc.exe runs with NT Authority\SYSTEM privileges, successful exploitation results in deletion of files with the highest system privileges, potentially impacting critical system files, application data, or security configurations. The attack vector requires local access and low privileges but no user interaction, making it a significant threat in environments where attackers can gain foothold with limited rights. The vulnerability has a CVSS v3.1 score of 7.8, indicating high severity due to its impact on confidentiality, integrity, and availability. No known public exploits or patches have been reported as of the publication date. This vulnerability could be leveraged for privilege escalation, denial of service, or to facilitate further attacks by removing security controls or critical files.

Potential Impact

The impact of CVE-2024-23773 is substantial for organizations using Quest KACE Agent on Windows systems. Since the vulnerability allows deletion of any file with SYSTEM privileges, attackers can disrupt system operations by deleting critical OS files, security logs, or application data, leading to denial of service or system instability. The ability to delete files with high privileges also enables attackers to remove forensic evidence or security configurations, complicating incident response and recovery efforts. In managed IT environments where Quest KACE is used for endpoint management and automation, exploitation could undermine the integrity and availability of managed systems, potentially affecting large numbers of endpoints. This could result in operational downtime, increased remediation costs, and exposure to further attacks. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments with weak access controls or where attackers have already compromised user accounts.

Mitigation Recommendations

To mitigate CVE-2024-23773, organizations should: 1) Immediately identify and inventory all systems running affected versions of Quest KACE Agent (12.0.38 and 13.1.23.0). 2) Monitor for updates or patches from Quest and apply them promptly once available. 3) Restrict local access to systems running the KACE Agent to trusted users only, enforcing the principle of least privilege. 4) Implement strict access controls and auditing on critical files and directories to detect unauthorized deletions. 5) Use endpoint detection and response (EDR) tools to monitor for suspicious activity related to file deletions or service misuse. 6) Harden the Windows environment by disabling unnecessary services and limiting service account privileges where possible. 7) Educate IT staff and users about the risks of local privilege escalation and enforce strong authentication and session management to reduce the chance of attacker foothold. 8) Prepare incident response plans that include recovery from arbitrary file deletion scenarios to minimize downtime.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d54b7ef31ef0b570600

Added to database: 2/25/2026, 9:44:52 PM

Last enriched: 2/26/2026, 10:16:58 AM

Last updated: 4/12/2026, 3:46:46 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses