CVE-2024-50804: n/a
CVE-2024-50804 is a high-severity vulnerability in Micro-star International's MSI Center Pro 2. 1. 37. 0 that arises from insecure file permissions on a backup data file. A local attacker with limited privileges can exploit this flaw by manipulating the Device_DeviceID. dat. bak file located in the C:\ProgramData\MSI\One Dragon Center\Data directory to execute arbitrary code. This vulnerability does not require user interaction but does require local access with some privileges. The vulnerability impacts confidentiality, integrity, and availability, allowing full system compromise. No public exploits are known yet, and no patches have been released as of the publication date.
AI Analysis
Technical Summary
CVE-2024-50804 is an insecure permissions vulnerability identified in Micro-star International's MSI Center Pro version 2.1.37.0. The vulnerability stems from improper access control on the Device_DeviceID.dat.bak file located in the C:\ProgramData\MSI\One Dragon Center\Data folder on Windows systems. Because the file permissions are insecure, a local attacker with limited privileges (low-level user rights) can replace or modify this backup data file to execute arbitrary code with the privileges of the MSI Center Pro application or potentially higher. The vulnerability is classified under CWE-94, which relates to improper control of code generation, indicating that the attacker can inject malicious code that the system will execute. The CVSS v3.1 base score is 7.8, reflecting high severity due to the combination of local attack vector, low attack complexity, required privileges, and no user interaction needed. The impact includes full compromise of confidentiality, integrity, and availability of the affected system. Although no public exploits or patches are currently available, the vulnerability poses a significant risk to users of MSI Center Pro, especially in environments where local user accounts are shared or less strictly controlled. The vulnerability was reserved on October 28, 2024, and published on November 18, 2024, indicating recent discovery and disclosure.
Potential Impact
The vulnerability allows a local attacker to execute arbitrary code, potentially leading to complete system compromise. This includes unauthorized access to sensitive data (confidentiality breach), modification or deletion of critical files (integrity breach), and disruption or denial of service (availability breach). Since MSI Center Pro is often installed on gaming and high-performance computing systems, the impact could extend to both consumer and enterprise environments. Attackers with local access could leverage this vulnerability to escalate privileges, implant persistent malware, or move laterally within a network. Organizations with shared or less controlled local user environments are at higher risk. The lack of a patch and public exploit increases the urgency for proactive mitigation. The threat could also undermine trust in MSI hardware and software ecosystems if exploited at scale.
Mitigation Recommendations
1. Immediately restrict permissions on the C:\ProgramData\MSI\One Dragon Center\Data folder and specifically on the Device_DeviceID.dat.bak file to allow access only to trusted system and application accounts. 2. Implement strict local user account controls to minimize the number of users with write access to MSI Center Pro directories. 3. Monitor file integrity of the Device_DeviceID.dat.bak file using endpoint detection and response (EDR) tools to detect unauthorized modifications. 4. Disable or uninstall MSI Center Pro if it is not essential, especially in high-security environments. 5. Apply principle of least privilege to local user accounts to reduce the risk of exploitation. 6. Stay alert for official patches or updates from MSI and apply them promptly once available. 7. Use application whitelisting to prevent unauthorized code execution from unexpected files or locations. 8. Conduct regular audits of local system permissions and user activities on affected endpoints. 9. Educate users about the risks of local privilege abuse and enforce strong local account management policies.
Affected Countries
United States, China, Germany, South Korea, Taiwan, Japan, Canada, United Kingdom, France, Russia
CVE-2024-50804: n/a
Description
CVE-2024-50804 is a high-severity vulnerability in Micro-star International's MSI Center Pro 2. 1. 37. 0 that arises from insecure file permissions on a backup data file. A local attacker with limited privileges can exploit this flaw by manipulating the Device_DeviceID. dat. bak file located in the C:\ProgramData\MSI\One Dragon Center\Data directory to execute arbitrary code. This vulnerability does not require user interaction but does require local access with some privileges. The vulnerability impacts confidentiality, integrity, and availability, allowing full system compromise. No public exploits are known yet, and no patches have been released as of the publication date.
AI-Powered Analysis
Technical Analysis
CVE-2024-50804 is an insecure permissions vulnerability identified in Micro-star International's MSI Center Pro version 2.1.37.0. The vulnerability stems from improper access control on the Device_DeviceID.dat.bak file located in the C:\ProgramData\MSI\One Dragon Center\Data folder on Windows systems. Because the file permissions are insecure, a local attacker with limited privileges (low-level user rights) can replace or modify this backup data file to execute arbitrary code with the privileges of the MSI Center Pro application or potentially higher. The vulnerability is classified under CWE-94, which relates to improper control of code generation, indicating that the attacker can inject malicious code that the system will execute. The CVSS v3.1 base score is 7.8, reflecting high severity due to the combination of local attack vector, low attack complexity, required privileges, and no user interaction needed. The impact includes full compromise of confidentiality, integrity, and availability of the affected system. Although no public exploits or patches are currently available, the vulnerability poses a significant risk to users of MSI Center Pro, especially in environments where local user accounts are shared or less strictly controlled. The vulnerability was reserved on October 28, 2024, and published on November 18, 2024, indicating recent discovery and disclosure.
Potential Impact
The vulnerability allows a local attacker to execute arbitrary code, potentially leading to complete system compromise. This includes unauthorized access to sensitive data (confidentiality breach), modification or deletion of critical files (integrity breach), and disruption or denial of service (availability breach). Since MSI Center Pro is often installed on gaming and high-performance computing systems, the impact could extend to both consumer and enterprise environments. Attackers with local access could leverage this vulnerability to escalate privileges, implant persistent malware, or move laterally within a network. Organizations with shared or less controlled local user environments are at higher risk. The lack of a patch and public exploit increases the urgency for proactive mitigation. The threat could also undermine trust in MSI hardware and software ecosystems if exploited at scale.
Mitigation Recommendations
1. Immediately restrict permissions on the C:\ProgramData\MSI\One Dragon Center\Data folder and specifically on the Device_DeviceID.dat.bak file to allow access only to trusted system and application accounts. 2. Implement strict local user account controls to minimize the number of users with write access to MSI Center Pro directories. 3. Monitor file integrity of the Device_DeviceID.dat.bak file using endpoint detection and response (EDR) tools to detect unauthorized modifications. 4. Disable or uninstall MSI Center Pro if it is not essential, especially in high-security environments. 5. Apply principle of least privilege to local user accounts to reduce the risk of exploitation. 6. Stay alert for official patches or updates from MSI and apply them promptly once available. 7. Use application whitelisting to prevent unauthorized code execution from unexpected files or locations. 8. Conduct regular audits of local system permissions and user activities on affected endpoints. 9. Educate users about the risks of local privilege abuse and enforce strong local account management policies.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b9eb7ef31ef0b557484
Added to database: 2/25/2026, 9:37:34 PM
Last enriched: 2/26/2026, 1:05:52 AM
Last updated: 2/26/2026, 6:55:24 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.