CVE-2024-9491
Published: 24 January 2025
Summary
CVE-2024-9491 is a high-severity Uncontrolled Search Path Element (CWE-427) vulnerability in Silabs (inferred from references). Its CVSS base score is 8.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique DLL Side-Loading (T1574.002); ranked at the 22.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-11 (User-installed Software) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly restricts and validates user-installed software such as the vulnerable Configuration Wizard 2 installer prior to execution, preventing DLL hijacking exploitation.
Ensures timely remediation of the specific DLL hijacking flaw in the Silicon Labs Configuration Wizard 2 installer via patching or vendor fixes.
Deploys malicious code protection mechanisms to scan for and block the malicious DLL loaded via the uncontrolled search path during installer execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct DLL side-loading via uncontrolled search path (CWE-427) in installer enables arbitrary code execution and privilege escalation.
NVD Description
DLL hijacking vulnerabilities, caused by an uncontrolled search path in Configuration Wizard 2 installer can lead to privilege escalation and arbitrary code execution when running the impacted installer.
Deeper analysisAI
CVE-2024-9491 is a DLL hijacking vulnerability stemming from an uncontrolled search path in the Configuration Wizard 2 installer, associated with Silicon Labs software. This issue, classified under CWE-427, enables privilege escalation and arbitrary code execution when the affected installer is executed. It carries a CVSS v3.1 base score of 8.6 (AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) and was published on 2025-01-24.
The vulnerability can be exploited by a local attacker with no required privileges who tricks a user into running the impacted installer, such as through social engineering. Successful exploitation allows the attacker to achieve privilege escalation and execute arbitrary code with elevated permissions due to the scope change from user interaction.
Mitigation details are outlined in the Silicon Labs community advisory at https://community.silabs.com/068Vm00000JUQwd.
Details
- CWE(s)