CVE-2024-50592: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in HASOMED Elefant Software Updater
An attacker with local access the to medical office computer can escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by exploiting a race condition in the Elefant Update Service during the repair or update process. When using the repair function, the service queries the server for a list of files and their hashes. In addition, instructions to execute binaries to finalize the repair process are included. The executables are executed as "NT AUTHORITY\SYSTEM" after they are copied over to the user writable installation folder (C:\Elefant1). This means that a user can overwrite either "PostESUUpdate.exe" or "Update_OpenJava.exe" in the time frame after the copy and before the execution of the final repair step. The overwritten executable is then executed as "NT AUTHORITY\SYSTEM".
CVE-2024-50592: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in HASOMED Elefant Software Updater
Description
An attacker with local access the to medical office computer can escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by exploiting a race condition in the Elefant Update Service during the repair or update process. When using the repair function, the service queries the server for a list of files and their hashes. In addition, instructions to execute binaries to finalize the repair process are included. The executables are executed as "NT AUTHORITY\SYSTEM" after they are copied over to the user writable installation folder (C:\Elefant1). This means that a user can overwrite either "PostESUUpdate.exe" or "Update_OpenJava.exe" in the time frame after the copy and before the execution of the final repair step. The overwritten executable is then executed as "NT AUTHORITY\SYSTEM".
Technical Details
- Data Version
 - 5.2
 - Assigner Short Name
 - SEC-VLab
 - Date Reserved
 - 2024-10-25T07:26:12.628Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 69092eea35043901e82cab31
Added to database: 11/3/2025, 10:38:34 PM
Last updated: 11/3/2025, 10:38:36 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-51464: CWE-288 Authentication Bypass Using an Alternate Path or Channel
MediumCVE-2024-51463: CWE-918 Server-Side Request Forgery (SSRF)
MediumCVE-2024-50593: CWE-798 Use of Hard-coded Credentials in HASOMED Elefant
HighCVE-2024-50591: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in HASOMED Elefant Software Updater
HighCVE-2024-50590: CWE-276 Incorrect Default Permissions in HASOMED Elefant
HighActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.