Lucene search

K
attackerkbAttackerKBAKB:5A05D3A2-36C3-4215-8987-AFC104E98883
HistoryAug 06, 2020 - 12:00 a.m.

CVE-2020-7360

2020-08-0600:00:00
attackerkb.com
13

0.001 Low

EPSS

Percentile

20.2%

An Uncontrolled Search Path Element (CWE-427) vulnerability in SmartControl version 4.3.15 and versions released before April 15, 2020 may allow an authenticated user to escalate privileges by placing a specially crafted DLL file in the search path. This issue was fixed in version 1.0.7, which was released after April 15, 2020. (Note, the version numbering system changed significantly between version 4.3.15 and version 1.0.7.)

Recent assessments:

bwatters-r7 at August 06, 2020 2:51pm UTC reported:

This is a dll hijack against Phillips SmartControl software that provides a privilege escalation. It requires an attacker to place a dll payload in a location writable to low-privilege user and having the user restart the application (or wait for a reboot). This would likely also be a good method for elevated persistence. As the software is likely not present in many enterprise settings and it requires user interaction or reboot, I think this has lower attacker value, but it would be very useful under those limited circumstances.
Mitigations might be as simple as creating dummy DLL files in the four locations created as SYSTEM or Administrator, preventing the attacker from a trivial low-privileges overwrite, adding the file locations to HIDS, or patching the software in question to something above 4.3.15

Assessed Attacker Value: 2
Assessed Attacker Value: 2Assessed Attacker Value: 3

0.001 Low

EPSS

Percentile

20.2%

Related for AKB:5A05D3A2-36C3-4215-8987-AFC104E98883