CVE-2024-50590: CWE-276 Incorrect Default Permissions in HASOMED Elefant
Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is writable for all users. In addition, the Elefant installer registers two Firebird database services which are running as “NT AUTHORITY\SYSTEM”. Path: C:\Elefant1\Firebird_2\bin\fbserver.exe Path: C:\Elefant1\Firebird_2\bin\fbguard.exe Both service binaries are user writable. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. Once the system has rebooted, the new service binary is executed as "NT AUTHORITY\SYSTEM".
AI Analysis
Technical Summary
CVE-2024-50590 is a vulnerability in the HASOMED Elefant medical office software caused by incorrect default permissions (CWE-276) on its installation directory (C:\Elefant1). This directory is writable by all users, allowing any local user to rename or overwrite two critical Firebird database service binaries: fbserver.exe and fbguard.exe. These services run with NT AUTHORITY\SYSTEM privileges, the highest level on Windows systems. By replacing these executables with malicious binaries and rebooting the system, an attacker can execute arbitrary code with SYSTEM privileges, effectively escalating their privileges from a standard user to full system control. The vulnerability also relates to CWE-732 (incorrect permissions on critical resources) and CWE-250 (execution with unnecessary privileges). The attack vector requires local access and low complexity but no user interaction. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability. The vulnerability affects Elefant versions prior to 24.04.00. No patches or exploits are currently publicly available, but the risk is significant given the sensitive nature of medical data and the criticality of the affected services.
Potential Impact
For European organizations, particularly healthcare providers using HASOMED Elefant, this vulnerability poses a severe risk. Exploitation allows attackers with local access to gain SYSTEM-level privileges, enabling full control over the affected system. This can lead to unauthorized access to sensitive patient data, modification or deletion of medical records, disruption of healthcare services, and potential ransomware deployment. The compromise of medical office systems can have cascading effects on patient care and regulatory compliance, including violations of GDPR due to data breaches. The vulnerability’s ease of exploitation from local access means insider threats or attackers who gain initial footholds via phishing or other means could escalate privileges rapidly. The impact on availability is also critical, as restarting services or systems with malicious binaries can cause downtime. Overall, the vulnerability threatens confidentiality, integrity, and availability of critical healthcare IT infrastructure in Europe.
Mitigation Recommendations
Immediate mitigation steps include restricting permissions on the Elefant installation directory (C:\Elefant1) to prevent write access by non-administrative users. Administrators should verify and correct ACLs to ensure only trusted accounts can modify service binaries. Monitoring file integrity of fbserver.exe and fbguard.exe with host-based intrusion detection systems can detect unauthorized changes. Until a vendor patch is available, consider isolating affected systems to limit local access and enforce strict user account controls and least privilege principles. Regularly audit local user accounts and remove unnecessary privileges. Implement endpoint protection solutions capable of detecting suspicious file modifications or service restarts. Once HASOMED releases a patch, promptly apply it to eliminate the vulnerability. Additionally, educate staff about the risks of local access and maintain robust physical security controls to prevent unauthorized access to medical office computers.
Affected Countries
Germany, Austria, Switzerland, France, Netherlands
CVE-2024-50590: CWE-276 Incorrect Default Permissions in HASOMED Elefant
Description
Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is "C:\Elefant1" which is writable for all users. In addition, the Elefant installer registers two Firebird database services which are running as “NT AUTHORITY\SYSTEM”. Path: C:\Elefant1\Firebird_2\bin\fbserver.exe Path: C:\Elefant1\Firebird_2\bin\fbguard.exe Both service binaries are user writable. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. Once the system has rebooted, the new service binary is executed as "NT AUTHORITY\SYSTEM".
AI-Powered Analysis
Technical Analysis
CVE-2024-50590 is a vulnerability in the HASOMED Elefant medical office software caused by incorrect default permissions (CWE-276) on its installation directory (C:\Elefant1). This directory is writable by all users, allowing any local user to rename or overwrite two critical Firebird database service binaries: fbserver.exe and fbguard.exe. These services run with NT AUTHORITY\SYSTEM privileges, the highest level on Windows systems. By replacing these executables with malicious binaries and rebooting the system, an attacker can execute arbitrary code with SYSTEM privileges, effectively escalating their privileges from a standard user to full system control. The vulnerability also relates to CWE-732 (incorrect permissions on critical resources) and CWE-250 (execution with unnecessary privileges). The attack vector requires local access and low complexity but no user interaction. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability. The vulnerability affects Elefant versions prior to 24.04.00. No patches or exploits are currently publicly available, but the risk is significant given the sensitive nature of medical data and the criticality of the affected services.
Potential Impact
For European organizations, particularly healthcare providers using HASOMED Elefant, this vulnerability poses a severe risk. Exploitation allows attackers with local access to gain SYSTEM-level privileges, enabling full control over the affected system. This can lead to unauthorized access to sensitive patient data, modification or deletion of medical records, disruption of healthcare services, and potential ransomware deployment. The compromise of medical office systems can have cascading effects on patient care and regulatory compliance, including violations of GDPR due to data breaches. The vulnerability’s ease of exploitation from local access means insider threats or attackers who gain initial footholds via phishing or other means could escalate privileges rapidly. The impact on availability is also critical, as restarting services or systems with malicious binaries can cause downtime. Overall, the vulnerability threatens confidentiality, integrity, and availability of critical healthcare IT infrastructure in Europe.
Mitigation Recommendations
Immediate mitigation steps include restricting permissions on the Elefant installation directory (C:\Elefant1) to prevent write access by non-administrative users. Administrators should verify and correct ACLs to ensure only trusted accounts can modify service binaries. Monitoring file integrity of fbserver.exe and fbguard.exe with host-based intrusion detection systems can detect unauthorized changes. Until a vendor patch is available, consider isolating affected systems to limit local access and enforce strict user account controls and least privilege principles. Regularly audit local user accounts and remove unnecessary privileges. Implement endpoint protection solutions capable of detecting suspicious file modifications or service restarts. Once HASOMED releases a patch, promptly apply it to eliminate the vulnerability. Additionally, educate staff about the risks of local access and maintain robust physical security controls to prevent unauthorized access to medical office computers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2024-10-25T07:26:12.628Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092eea35043901e82cab27
Added to database: 11/3/2025, 10:38:34 PM
Last enriched: 11/3/2025, 11:38:03 PM
Last updated: 12/17/2025, 5:01:49 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59374: CWE-506: Embedded Malicious Code in ASUS live update
CriticalCVE-2025-14385: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brechtvds WP Recipe Maker
MediumCVE-2025-13880: CWE-862 Missing Authorization in adreastrian WP Social Ninja – Embed Social Feeds, User Reviews & Chat Widgets
MediumCVE-2025-13861: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in linksoftware HTML Forms – Simple WordPress Forms Plugin
MediumCVE-2025-11901: CWE-284: Improper Access Control in ASUS B460 series
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.