Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42050: n/a

0
High
VulnerabilityCVE-2024-42050cvecve-2024-42050
Published: Sun Jul 28 2024 (07/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The MSI installer for Splashtop Streamer for Windows before 3.7.0.0 uses a temporary folder with weak permissions during installation. A local user can exploit this to escalate privileges to SYSTEM via an oplock on CredProvider_Inst.reg.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:54:41 UTC

Technical Analysis

CVE-2024-42050 is a vulnerability identified in the MSI installer of Splashtop Streamer for Windows versions before 3.7.0.0. During installation, the MSI installer creates and uses a temporary folder with weak permissions, which can be accessed or manipulated by local users. Specifically, the vulnerability involves an opportunistic lock (oplock) on the file CredProvider_Inst.reg within this temporary folder. An oplock allows a local attacker to interfere with the file operations during installation, enabling them to escalate their privileges to SYSTEM level. This is a classic case of improper access control (CWE-269) where the installer does not securely restrict access to temporary installation files, allowing unauthorized modification or interference. The attack vector requires local access with low privileges but does not require user interaction, making it a potent threat in environments where multiple users have local accounts. The vulnerability has a CVSS v3.1 score of 7.0, reflecting high impact on confidentiality, integrity, and availability, with a high complexity due to the need for local access but no user interaction. No public exploits have been reported yet, but the nature of the vulnerability suggests it could be weaponized for privilege escalation in compromised environments.

Potential Impact

If exploited, this vulnerability allows a local attacker to escalate privileges from a standard user to SYSTEM, the highest privilege level on Windows systems. This can lead to full system compromise, including the ability to install persistent malware, disable security controls, access sensitive data, and move laterally within a network. Organizations using Splashtop Streamer for remote access or support could see attackers leverage this flaw to gain control over critical systems, undermining confidentiality, integrity, and availability. The impact is particularly severe in multi-user environments, shared workstations, or managed service provider setups where local user accounts exist but should not have administrative control. The lack of required user interaction increases the risk of automated or stealthy exploitation once local access is obtained. Although no exploits are currently known in the wild, the vulnerability’s characteristics make it a significant risk for targeted attacks or insider threats.

Mitigation Recommendations

1. Upgrade Splashtop Streamer to version 3.7.0.0 or later where this vulnerability is fixed. 2. If immediate patching is not possible, restrict local user permissions to prevent access to temporary installation folders during MSI installation. 3. Use application whitelisting and endpoint protection to monitor and block suspicious file operations or privilege escalation attempts involving the installer. 4. Implement strict local account management policies, minimizing the number of users with local access and regularly auditing local accounts. 5. Employ system integrity monitoring to detect unauthorized changes to system files and registry keys, including CredProvider_Inst.reg. 6. Consider deploying Windows Defender Exploit Guard or similar tools to block exploitation techniques involving oplocks or file manipulation during installation. 7. Monitor logs for unusual installer activity or privilege escalation attempts, especially on systems running Splashtop Streamer.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cc0b7ef31ef0b568c67

Added to database: 2/25/2026, 9:42:24 PM

Last enriched: 2/28/2026, 5:54:41 AM

Last updated: 4/12/2026, 2:02:51 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses