Improper input validation in the OSSEC HIDS agent for Windows prior to version 3.8.0 allows an attacker in with control over the OSSEC server or in possession of the agent's key to configure the agent to connect to a malicious UNC path. This results in the leakage of the machine account NetNTLMv2 hash, which can be relayed for remote code execution or used to escalate privileges to SYSTEM via AD CS certificate forging and other similar attacks.
History

Wed, 11 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Jun 2025 03:15:00 +0000

Type Values Removed Values Added
Description Improper input validation in the OSSEC HIDS agent for Windows prior to version 3.8.0 allows an attacker in with control over the OSSEC server or in possession of the agent's key to configure the agent to connect to a malicious UNC path. This results in the leakage of the machine account NetNTLMv2 hash, which can be relayed for remote code execution or used to escalate privileges to SYSTEM via AD CS certificate forging and other similar attacks.
Title Remote code execution and local privilege escalation due to UNC access and NetNTLMv2 hash theft
Weaknesses CWE-20
CWE-73
References
Metrics cvssV4_0

{'score': 9.5, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Pentraze

Published: 2025-06-11T02:59:06.240Z

Updated: 2025-06-11T13:31:20.308Z

Reserved: 2024-02-06T00:37:58.090Z

Link: CVE-2024-1244

cve-icon Vulnrichment

Updated: 2025-06-11T13:31:15.964Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-11T03:15:21.253

Modified: 2025-06-12T16:06:20.180

Link: CVE-2024-1244

cve-icon Redhat

No data.