Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39708: n/a

0
High
VulnerabilityCVE-2024-39708cvecve-2024-39708
Published: Thu Jun 27 2024 (06/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in the Agent in Delinea Privilege Manager (formerly Thycotic Privilege Manager) before 12.0.1096 on Windows. Sometimes, a non-administrator user can copy a crafted DLL file to a temporary directory (used by .NET Shadow Copies) such that privilege escalation can occur if the core agent service loads that file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:23:49 UTC

Technical Analysis

CVE-2024-39708 is a vulnerability identified in the Agent component of Delinea Privilege Manager (previously Thycotic Privilege Manager) on Windows platforms, affecting versions before 12.0.1096. The issue arises from the agent's handling of DLL files in temporary directories associated with .NET Shadow Copies. A non-administrator user can exploit this by copying a specially crafted DLL into these temporary directories. When the core agent service loads this DLL, it executes the malicious code with elevated privileges, resulting in privilege escalation. This vulnerability is classified under CWE-427, which involves unsafe dynamic library loading, allowing attackers to influence the code executed by a privileged process. The attack vector requires local access with low privileges and does not require user interaction, but the attack complexity is high due to the need to place the DLL in a specific temporary directory. The CVSS v3.1 score is 7.0, reflecting high impact on confidentiality, integrity, and availability, with attack vector local, attack complexity high, privileges required low, and no user interaction. No public exploits have been reported yet, but the vulnerability poses a significant risk to environments relying on Delinea Privilege Manager for privilege management and endpoint security.

Potential Impact

The vulnerability allows an attacker with low-level local access to escalate privileges to a higher level, potentially SYSTEM or administrator privileges, depending on the agent service context. This can lead to full system compromise, unauthorized access to sensitive data, and the ability to disable or manipulate security controls managed by Delinea Privilege Manager. Organizations relying on this product for privileged access management could see their security posture severely degraded, enabling lateral movement, persistence, and data exfiltration. The impact spans confidentiality, integrity, and availability, as attackers can gain unauthorized control and disrupt operations. Since the agent runs with elevated privileges, exploitation could undermine the entire endpoint security framework. The lack of known exploits in the wild suggests limited current exploitation, but the vulnerability is likely to attract attacker interest given the privileged context and widespread use of the product in enterprise environments.

Mitigation Recommendations

1. Immediately monitor for updates from Delinea and apply patches or upgrades to version 12.0.1096 or later once available. 2. Until patched, restrict write permissions to temporary directories used by .NET Shadow Copies to prevent unauthorized DLL placement by non-administrators. 3. Implement application whitelisting and DLL loading restrictions to ensure only trusted DLLs are loaded by the agent service. 4. Employ endpoint detection and response (EDR) tools to monitor for suspicious DLL loading behaviors and privilege escalation attempts. 5. Conduct regular audits of permissions on temporary directories and shadow copy locations to detect and remediate misconfigurations. 6. Limit local user privileges and enforce the principle of least privilege to reduce the attack surface. 7. Consider isolating or segmenting systems running Delinea Privilege Manager agents to contain potential compromises. 8. Educate system administrators about this vulnerability and encourage vigilance for unusual system behaviors or logs indicating DLL hijacking attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c87b7ef31ef0b565ef8

Added to database: 2/25/2026, 9:41:27 PM

Last enriched: 2/28/2026, 4:23:49 AM

Last updated: 4/11/2026, 4:59:07 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses