Lucene search

K
zdtSimon Bieber1337DAY-ID-36398
HistoryJun 11, 2021 - 12:00 a.m.

NetSetMan Pro 4.7.2 Privilege Escalation Exploit

2021-06-1100:00:00
Simon Bieber
0day.today
36

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

65.4%

NetSetManPro 4.7.2 Privilege Escalation Exploit

Affected Products
    NetSetManPro 4.7.2 (other/older releases have not been tested)

References
    https://www.secuvera.de/advisories/secuvera-SA-2021-01.txt (used for 
updates)
    CVE-2021-34546 
(https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34546)

Summary:
    "NetSetMan is a network settings manager software for easily 
switching between
    your preconfigured profiles."

    The save file dialogue within the action log window after switching a 
profile
    using the pre-logon profile switching (if intentionaly enabled) leads 
to
    arbitrary command execution as system authority user enabling an 
unauthenticated
    attacker to log on.

Effect:
    An unauthenticated attacker with physical access to a computer with 
NetSetMan Pro
    4.7.2 installed, that has the pre-logon profile switch activated (not 
enabled by
    default) as button withinthe windows logon screen, is able to drop to 
an admin-
    istrative shell and execute arbitrary commands as system user by the 
use of the
    "save log to file" feature within NetSetMan Pro.

Example:
    On a client computer running Microsoft Windows 10 and NetSetMan Pro 
an Icon can
    appear on the Windows lock-screen if configured. The following steps 
must be per-
    formed in order to gain an administrative shell:
    1. Boot the client system
    2. Click on the NetSetMan Pro Icon.
    3. Choose an user defined (empty) setting.
    4. Click on the "save" button in the appearing Window within the 
"Log" section
       (save icon)
    5. Click on "File-Type" and Choose "*.*"
    6. Navigate to path "C:\Windows\System32\"
    7. Right-Click on on "cmd.exe" and choose "Run as administrator...".
    8. The appearing command prompt has administrative rights.

    To be able to bypass authentication a local user with administrative 
rights can
    be added using the following commands:
    a. net user Pentest Password123! /add
    b. net localgroup Administrators Pentest /add

Solution:
    Update to Version 5.0 or newer (5.0.6 was tested by the researcher).

Disclosure Timeline:
    2021/05/17 vendor initially contacted, submitted all details.
    2021/05/17 vendor replied suggesting vulnerability already fixed
               in newer versions prior researcher contact
    2021/06/02 verified vendor suggested fix using version 5.0.6;
               updated advisory and contacted vendor again; vendor
               suggested edits
    2021/06/09 updated advisory and requested CVE identifier
    2021/06/10 public disclosure

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

65.4%

Related for 1337DAY-ID-36398