exacqVision 9.8 Unquoted Service Path Privilege Escalation

ID ZSL-2019-5515
Type zeroscience
Reporter Gjoko Krstic
Modified 2019-03-18T00:00:00


Title: exacqVision 9.8 Unquoted Service Path Privilege Escalation
Advisory ID: ZSL-2019-5515
Type: Local
Impact: Privilege Escalation
Risk: (2/5)
Release Date: 18.03.2019


The exacqVision VMS (Video Management System) software records surveillance video from thousands of IP camera models and displays on a free Windows, Linux or OSX client software, web browser or mobile device.


The application suffers from an unquoted search path issue impacting the services 'exacqVisionServer', 'dvrdhcpserver' and 'mdnsresponder' for Windows deployed as part of exacqVision software application. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.


Exacq Technologies, Inc. - <https://www.exacq.com>

Affected Version

Tested On

Microsoft Windows 7 Professional SP1 (EN)

Vendor Status

[18.07.2019] Vendor releases version 19.03 to address this issue.




Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>


[1] <https://packetstormsecurity.com/files/152128>
[2] <https://cxsecurity.com/issue/WLB-2019030189>
[3] <https://www.johnsoncontrols.com/-/media/jci/cyber-solutions/product-security-advisories/2019/jcipsa201903-v21-exacqvision-server.pdf>
[4] <https://www.us-cert.gov/ics/advisories/icsa-19-199-01>
[5] <https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7590>
[6] <https://nvd.nist.gov/vuln/detail/CVE-2019-7590>
[7] <https://www.securityfocus.com/bid/109307>


[18.03.2019] - Initial release
[27.03.2019] - Added reference [1] and [2]
[24.07.2019] - Added vendor status and reference [3], [4], [5], [6] and [7]


Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: lab@zeroscience.mk

                                            &lt;html&gt;&lt;head&gt;&lt;title&gt;403 Nothing to see.&lt;/title&gt;
&lt;link rel="Shortcut Icon" href="favicon.ico" type="image/x-icon"&gt;
&lt;style type="text/css"&gt;
body {
	background-color: #000;
body,td,th {
	font-family: Verdana, Geneva, sans-serif;
a:link {
	color: #008FEF;
	text-decoration: none;
a:visited {
	color: #008FEF;
	text-decoration: none;
a:hover {
	text-decoration: underline;
	color: #666;
a:active {
	text-decoration: none;
&lt;body bgcolor=black&gt;
&lt;font color="#7E88A3" size="2"&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;h1&gt;403 Nothing to see.&lt;/h1&gt;

You do not have the powah for this request /403.shtml&lt;br /&gt;&lt;br /&gt;
&lt;font size="2"&gt;&lt;a href="https://www.zeroscience.mk"&gt;https://www.zeroscience.mk&lt;/a&gt;&lt;/font&gt;