Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50804: n/a

0
High
VulnerabilityCVE-2024-50804cvecve-2024-50804
Published: Mon Nov 18 2024 (11/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-50804 is a high-severity vulnerability in Micro-star International's MSI Center Pro 2. 1. 37. 0 that arises from insecure file permissions on a backup data file. A local attacker with limited privileges can exploit this flaw by manipulating the Device_DeviceID. dat. bak file located in the C:\ProgramData\MSI\One Dragon Center\Data directory to execute arbitrary code. This vulnerability does not require user interaction but does require local access with some privileges. The vulnerability impacts confidentiality, integrity, and availability, allowing full system compromise. No public exploits are known yet, and no patches have been released as of the publication date.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:05:52 UTC

Technical Analysis

CVE-2024-50804 is an insecure permissions vulnerability identified in Micro-star International's MSI Center Pro version 2.1.37.0. The vulnerability stems from improper access control on the Device_DeviceID.dat.bak file located in the C:\ProgramData\MSI\One Dragon Center\Data folder on Windows systems. Because the file permissions are insecure, a local attacker with limited privileges (low-level user rights) can replace or modify this backup data file to execute arbitrary code with the privileges of the MSI Center Pro application or potentially higher. The vulnerability is classified under CWE-94, which relates to improper control of code generation, indicating that the attacker can inject malicious code that the system will execute. The CVSS v3.1 base score is 7.8, reflecting high severity due to the combination of local attack vector, low attack complexity, required privileges, and no user interaction needed. The impact includes full compromise of confidentiality, integrity, and availability of the affected system. Although no public exploits or patches are currently available, the vulnerability poses a significant risk to users of MSI Center Pro, especially in environments where local user accounts are shared or less strictly controlled. The vulnerability was reserved on October 28, 2024, and published on November 18, 2024, indicating recent discovery and disclosure.

Potential Impact

The vulnerability allows a local attacker to execute arbitrary code, potentially leading to complete system compromise. This includes unauthorized access to sensitive data (confidentiality breach), modification or deletion of critical files (integrity breach), and disruption or denial of service (availability breach). Since MSI Center Pro is often installed on gaming and high-performance computing systems, the impact could extend to both consumer and enterprise environments. Attackers with local access could leverage this vulnerability to escalate privileges, implant persistent malware, or move laterally within a network. Organizations with shared or less controlled local user environments are at higher risk. The lack of a patch and public exploit increases the urgency for proactive mitigation. The threat could also undermine trust in MSI hardware and software ecosystems if exploited at scale.

Mitigation Recommendations

1. Immediately restrict permissions on the C:\ProgramData\MSI\One Dragon Center\Data folder and specifically on the Device_DeviceID.dat.bak file to allow access only to trusted system and application accounts. 2. Implement strict local user account controls to minimize the number of users with write access to MSI Center Pro directories. 3. Monitor file integrity of the Device_DeviceID.dat.bak file using endpoint detection and response (EDR) tools to detect unauthorized modifications. 4. Disable or uninstall MSI Center Pro if it is not essential, especially in high-security environments. 5. Apply principle of least privilege to local user accounts to reduce the risk of exploitation. 6. Stay alert for official patches or updates from MSI and apply them promptly once available. 7. Use application whitelisting to prevent unauthorized code execution from unexpected files or locations. 8. Conduct regular audits of local system permissions and user activities on affected endpoints. 9. Educate users about the risks of local privilege abuse and enforce strong local account management policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b9eb7ef31ef0b557484

Added to database: 2/25/2026, 9:37:34 PM

Last enriched: 2/26/2026, 1:05:52 AM

Last updated: 2/26/2026, 6:55:24 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats