Vulnerability CVE-2018-18435


Published: 2019-03-21

Description:
KioWare Server version 4.9.6 and older installs by default to "C:\kioware_com" with weak folder permissions granting any user full permission "Everyone: (F)" to the contents of the directory and it's sub-folders. In addition, the program installs a service called "KWSService" which runs as "Localsystem", this will allow any user to escalate privileges to "NT AUTHORITY\SYSTEM" by substituting the service's binary with a malicious one.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
KioWare Server Version 4.9.6 Weak Folder Permissions Privilege Escalation
Hashim Jawad
07.01.2019
Med.
KioWare Server 4.9.6 Privilege Escalation
Hashim Jawad
08.01.2019

Type:

CWE-732

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Kioware -> Kioware server 

 References:
http://packetstormsecurity.com/files/151031/KioWare-Server-4.9.6-Privilege-Escalation.html
https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-002.md
https://m.kioware.com/news/kioware-press-releases/kioware_server_security_patch_update
https://www.exploit-db.com/exploits/46093/
https://www.kioware.com/patch.aspx

Copyright 2024, cxsecurity.com

 

Back to Top