CVE-2024-50590: CWE-276 Incorrect Default Permissions in HASOMED Elefant
Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is writable for all users. In addition, the Elefant installer registers two Firebird database services which are running as “NT AUTHORITY\SYSTEM”. Path: C:\Elefant1\Firebird_2\bin\fbserver.exe Path: C:\Elefant1\Firebird_2\bin\fbguard.exe Both service binaries are user writable. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. Once the system has rebooted, the new service binary is executed as "NT AUTHORITY\SYSTEM".
CVE-2024-50590: CWE-276 Incorrect Default Permissions in HASOMED Elefant
Description
Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is writable for all users. In addition, the Elefant installer registers two Firebird database services which are running as “NT AUTHORITY\SYSTEM”. Path: C:\Elefant1\Firebird_2\bin\fbserver.exe Path: C:\Elefant1\Firebird_2\bin\fbguard.exe Both service binaries are user writable. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. Once the system has rebooted, the new service binary is executed as "NT AUTHORITY\SYSTEM".
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2024-10-25T07:26:12.628Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092eea35043901e82cab27
Added to database: 11/3/2025, 10:38:34 PM
Last updated: 11/3/2025, 10:45:43 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-54531: An app may be able to bypass kASLR in Apple macOS
MediumCVE-2024-54529: An app may be able to execute arbitrary code with kernel privileges in Apple macOS
HighCVE-2024-54528: An app may be able to overwrite arbitrary files in Apple macOS
HighCVE-2024-54527: An app may be able to access sensitive user data in Apple tvOS
MediumCVE-2024-54526: A malicious app may be able to access private information in Apple tvOS
MediumActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.