Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34474: n/a

0
High
VulnerabilityCVE-2024-34474cvecve-2024-34474
Published: Sun May 05 2024 (05/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Clario through 2024-04-11 for Desktop has weak permissions for %PROGRAMDATA%\Clario and tries to load DLLs from there as SYSTEM.

AI-Powered Analysis

AILast updated: 02/25/2026, 21:42:00 UTC

Technical Analysis

CVE-2024-34474 is a vulnerability identified in Clario Desktop software versions up to April 11, 2024, involving improper permissions on the %PROGRAMDATA%\Clario directory. The directory is used by the application to load Dynamic Link Libraries (DLLs) with SYSTEM-level privileges. Due to weak access control (CWE-276: Incorrect Default Permissions), an attacker with low privileges can write or replace DLL files in this directory. When Clario loads these DLLs, it executes attacker-controlled code with SYSTEM privileges, resulting in a local privilege escalation (LPE). The CVSS 3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and limited privileges required but no user interaction. The vulnerability does not require network access and is exploitable only locally. No patches or exploit code are currently publicly available, but the risk is significant given the potential for full system compromise. This vulnerability highlights the importance of secure permission settings on directories used for loading executable code, especially when elevated privileges are involved.

Potential Impact

The primary impact of CVE-2024-34474 is local privilege escalation, enabling an attacker with limited user rights to gain SYSTEM-level control over affected Windows endpoints running Clario Desktop. This can lead to full system compromise, including the ability to install persistent malware, steal sensitive data, disable security controls, and move laterally within networks. The compromise of SYSTEM privileges undermines the confidentiality, integrity, and availability of the host system. For organizations, this can result in data breaches, operational disruption, and increased risk of ransomware or other advanced attacks. Since the vulnerability requires local access, it is particularly dangerous in environments where multiple users share systems or where attackers have already gained limited footholds. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability is likely to attract attacker interest due to its high impact and straightforward exploitation conditions.

Mitigation Recommendations

Organizations should immediately audit and restrict permissions on the %PROGRAMDATA%\Clario directory to ensure that only trusted system accounts have write access, preventing unauthorized DLL replacement. Until an official patch is released, consider implementing application whitelisting or code integrity policies to block unauthorized DLL loading by Clario. Employ endpoint detection and response (EDR) tools to monitor for suspicious DLL modifications or privilege escalation attempts. Limit local user privileges following the principle of least privilege to reduce the attack surface. Regularly review and harden system configurations, especially on shared or multi-user systems. Engage with Clario support or vendor channels to obtain patches or official guidance as soon as they become available. Additionally, educate users and administrators about the risks of local privilege escalation and the importance of maintaining secure file permissions on critical application directories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c51b7ef31ef0b56285d

Added to database: 2/25/2026, 9:40:33 PM

Last enriched: 2/25/2026, 9:42:00 PM

Last updated: 2/26/2026, 8:02:30 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats