Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50590: CWE-276 Incorrect Default Permissions in HASOMED Elefant

0
High
VulnerabilityCVE-2024-50590cvecve-2024-50590cwe-276cwe-732cwe-250
Published: Fri Nov 08 2024 (11/08/2024, 11:45:04 UTC)
Source: CVE Database V5
Vendor/Project: HASOMED
Product: Elefant

Description

Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is writable for all users. In addition, the Elefant installer registers two Firebird database services which are running as “NT AUTHORITY\SYSTEM”.  Path: C:\Elefant1\Firebird_2\bin\fbserver.exe Path: C:\Elefant1\Firebird_2\bin\fbguard.exe Both service binaries are user writable. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. Once the system has rebooted, the new service binary is executed as "NT AUTHORITY\SYSTEM".

AI-Powered Analysis

AILast updated: 11/03/2025, 23:38:03 UTC

Technical Analysis

CVE-2024-50590 is a vulnerability in the HASOMED Elefant medical office software caused by incorrect default permissions (CWE-276) on its installation directory (C:\Elefant1). This directory is writable by all users, allowing any local user to rename or overwrite two critical Firebird database service binaries: fbserver.exe and fbguard.exe. These services run with NT AUTHORITY\SYSTEM privileges, the highest level on Windows systems. By replacing these executables with malicious binaries and rebooting the system, an attacker can execute arbitrary code with SYSTEM privileges, effectively escalating their privileges from a standard user to full system control. The vulnerability also relates to CWE-732 (incorrect permissions on critical resources) and CWE-250 (execution with unnecessary privileges). The attack vector requires local access and low complexity but no user interaction. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability. The vulnerability affects Elefant versions prior to 24.04.00. No patches or exploits are currently publicly available, but the risk is significant given the sensitive nature of medical data and the criticality of the affected services.

Potential Impact

For European organizations, particularly healthcare providers using HASOMED Elefant, this vulnerability poses a severe risk. Exploitation allows attackers with local access to gain SYSTEM-level privileges, enabling full control over the affected system. This can lead to unauthorized access to sensitive patient data, modification or deletion of medical records, disruption of healthcare services, and potential ransomware deployment. The compromise of medical office systems can have cascading effects on patient care and regulatory compliance, including violations of GDPR due to data breaches. The vulnerability’s ease of exploitation from local access means insider threats or attackers who gain initial footholds via phishing or other means could escalate privileges rapidly. The impact on availability is also critical, as restarting services or systems with malicious binaries can cause downtime. Overall, the vulnerability threatens confidentiality, integrity, and availability of critical healthcare IT infrastructure in Europe.

Mitigation Recommendations

Immediate mitigation steps include restricting permissions on the Elefant installation directory (C:\Elefant1) to prevent write access by non-administrative users. Administrators should verify and correct ACLs to ensure only trusted accounts can modify service binaries. Monitoring file integrity of fbserver.exe and fbguard.exe with host-based intrusion detection systems can detect unauthorized changes. Until a vendor patch is available, consider isolating affected systems to limit local access and enforce strict user account controls and least privilege principles. Regularly audit local user accounts and remove unnecessary privileges. Implement endpoint protection solutions capable of detecting suspicious file modifications or service restarts. Once HASOMED releases a patch, promptly apply it to eliminate the vulnerability. Additionally, educate staff about the risks of local access and maintain robust physical security controls to prevent unauthorized access to medical office computers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2024-10-25T07:26:12.628Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092eea35043901e82cab27

Added to database: 11/3/2025, 10:38:34 PM

Last enriched: 11/3/2025, 11:38:03 PM

Last updated: 12/17/2025, 5:01:49 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats