CVE-2024-48200: n/a
An issue in MobaXterm v24.2 allows a local attacker to escalate privileges and execute arbitrary code via the remove function of the MobaXterm MSI is spawning one Administrative cmd (conhost.exe)
AI Analysis
Technical Summary
CVE-2024-48200 is a local privilege escalation vulnerability identified in MobaXterm version 24.2, a popular terminal emulator and remote computing tool for Windows. The flaw resides in the MSI installer removal function, which improperly spawns an administrative command shell process (conhost.exe) without adequate security controls. This behavior allows a local attacker with access to the system to escalate privileges from a non-privileged user to administrative level by executing arbitrary code during the removal process. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. The MSI removal function's misuse of spawning an elevated conhost.exe process is the core technical vector enabling this exploit. Although no public exploits have been reported yet, the vulnerability’s characteristics and high CVSS score (8.4) indicate a severe risk. The affected software is widely used by system administrators, developers, and IT professionals for remote management, making the vulnerability impactful in enterprise and operational environments. The lack of available patches or mitigations at the time of publication necessitates immediate attention to reduce exposure.
Potential Impact
The impact of CVE-2024-48200 is significant as it allows local attackers to gain administrative privileges on affected Windows systems running MobaXterm 24.2. This privilege escalation can lead to complete system compromise, enabling attackers to install malware, steal sensitive data, modify system configurations, or disrupt system availability. Organizations relying on MobaXterm for remote management or development tasks face increased risk, especially if endpoint security is weak or local access controls are insufficient. The vulnerability undermines the confidentiality, integrity, and availability of affected systems. In environments with shared or multi-user access, the risk of lateral movement and further exploitation increases. Although exploitation requires local access, the ease of exploitation without user interaction or authentication amplifies the threat. This vulnerability could be leveraged in targeted attacks or insider threat scenarios, impacting sectors such as finance, government, healthcare, and critical infrastructure where MobaXterm usage is prevalent.
Mitigation Recommendations
To mitigate CVE-2024-48200, organizations should immediately restrict local access to systems running MobaXterm 24.2, ensuring only trusted users have physical or remote desktop access. Monitor and audit usage of MobaXterm and MSI installer operations for unusual activity, especially processes spawning conhost.exe with elevated privileges. Until an official patch is released, consider uninstalling MobaXterm or reverting to a previous, unaffected version if feasible. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block unauthorized privilege escalation attempts. Harden Windows security policies by enforcing least privilege principles and disabling unnecessary local administrator accounts. Additionally, educate users about the risks of local privilege escalation and enforce strict access controls on shared systems. Regularly check for updates from MobaXterm vendors and apply patches promptly once available. Implementing these targeted controls will reduce the attack surface and limit the potential for exploitation.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, India, Canada, Australia, Netherlands, Sweden, Singapore
CVE-2024-48200: n/a
Description
An issue in MobaXterm v24.2 allows a local attacker to escalate privileges and execute arbitrary code via the remove function of the MobaXterm MSI is spawning one Administrative cmd (conhost.exe)
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-48200 is a local privilege escalation vulnerability identified in MobaXterm version 24.2, a popular terminal emulator and remote computing tool for Windows. The flaw resides in the MSI installer removal function, which improperly spawns an administrative command shell process (conhost.exe) without adequate security controls. This behavior allows a local attacker with access to the system to escalate privileges from a non-privileged user to administrative level by executing arbitrary code during the removal process. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. The MSI removal function's misuse of spawning an elevated conhost.exe process is the core technical vector enabling this exploit. Although no public exploits have been reported yet, the vulnerability’s characteristics and high CVSS score (8.4) indicate a severe risk. The affected software is widely used by system administrators, developers, and IT professionals for remote management, making the vulnerability impactful in enterprise and operational environments. The lack of available patches or mitigations at the time of publication necessitates immediate attention to reduce exposure.
Potential Impact
The impact of CVE-2024-48200 is significant as it allows local attackers to gain administrative privileges on affected Windows systems running MobaXterm 24.2. This privilege escalation can lead to complete system compromise, enabling attackers to install malware, steal sensitive data, modify system configurations, or disrupt system availability. Organizations relying on MobaXterm for remote management or development tasks face increased risk, especially if endpoint security is weak or local access controls are insufficient. The vulnerability undermines the confidentiality, integrity, and availability of affected systems. In environments with shared or multi-user access, the risk of lateral movement and further exploitation increases. Although exploitation requires local access, the ease of exploitation without user interaction or authentication amplifies the threat. This vulnerability could be leveraged in targeted attacks or insider threat scenarios, impacting sectors such as finance, government, healthcare, and critical infrastructure where MobaXterm usage is prevalent.
Mitigation Recommendations
To mitigate CVE-2024-48200, organizations should immediately restrict local access to systems running MobaXterm 24.2, ensuring only trusted users have physical or remote desktop access. Monitor and audit usage of MobaXterm and MSI installer operations for unusual activity, especially processes spawning conhost.exe with elevated privileges. Until an official patch is released, consider uninstalling MobaXterm or reverting to a previous, unaffected version if feasible. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block unauthorized privilege escalation attempts. Harden Windows security policies by enforcing least privilege principles and disabling unnecessary local administrator accounts. Additionally, educate users about the risks of local privilege escalation and enforce strict access controls on shared systems. Regularly check for updates from MobaXterm vendors and apply patches promptly once available. Implementing these targeted controls will reduce the attack surface and limit the potential for exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-08T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d0db7ef31ef0b56d83d
Added to database: 2/25/2026, 9:43:41 PM
Last enriched: 2/28/2026, 7:41:02 AM
Last updated: 4/12/2026, 3:39:55 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.