ZoneAlarm TrueVector Internet Monitor Insecure NTFS Permissions

2020.03.19
Credit: Yorick Koster
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

------------------------------------------------------------------------ ZoneAlarm TrueVector Internet Monitor service insecure NTFS permissions vulnerability ------------------------------------------------------------------------ Yorick Koster, December 2019 ------------------------------------------------------------------------ Abstract ------------------------------------------------------------------------ A vulnerability was found in the TrueVector Internet Monitor service, which is installed as part of the Check Point ZoneAlarm firewall. This vulnerability allows a local attacker to cause the affected service to change the file permissions of arbitrary local files. After the file permissions have been changed, the attacker can then overwrite its content, and ultimately gain elevated privileges on the vulnerable machine. ------------------------------------------------------------------------ Tested version ------------------------------------------------------------------------ This vulnerability was successfully verified on ZoneAlarm Free Firewall v15.8.023.18219/TrueVector Internet Monitor v15.8.7.18219. ------------------------------------------------------------------------ Fix ------------------------------------------------------------------------ Check Point released new versions of ZoneAlarm Firewall that fix this vulnerability. The latest version of ZoneAlarm Free Firewall (v15.8.043.18324) can be obtained from https://www.zonealarm.com/software/free-firewall/download. The 2020-03 Cumulative Update [2] for Windows 10 adds hardlink mitigations. After installing this update, Windows will require write access on the target file otherwise the hardlink won't be created. Requiring write access on the target file also mitigates this issue. ------------------------------------------------------------------------ Introduction ------------------------------------------------------------------------ A vulnerability was found in the TrueVector Internet Monitor service, which is installed as part of the Check Point ZoneAlarm firewall. This vulnerability allows a local attacker to cause the affected service to change the file permissions of arbitrary local files. After the file permissions have been changed, the attacker can then overwrite its content, and ultimately gain elevated privileges on the vulnerable machine. ------------------------------------------------------------------------ Vulnerability details ------------------------------------------------------------------------ The TrueVector Internet Monitor service is running as LocalSystem, it periodically creates a number of backup files within the %ProgramData%\CheckPoint\ZoneAlarm\Data\ folder. When these files are created, their file permissions are explicitly set to Full Control for Authenticated Users. A local attacker can create a hardlink with the same name as the backup files, causing the permissions of another file to be changed. After the file permissions have been changed, the attacker can then overwrite its content, and ultimately gain elevated privileges on the vulnerable machine. Hardlinks can be created using James Forshaw's [3] CreateHardlink [4] tool. CreateHardlink.exe "%ProgramData%\CheckPoint\ZoneAlarm\Data\bu_tosave.ndb" "%SystemRoot%\win.ini" CreateHardlink.exe "%ProgramData%\CheckPoint\ZoneAlarm\Data\bu_todelete.ndb" "%SystemRoot%\win.ini" ------------------------------------------------------------------------ References ------------------------------------------------------------------------ [1] https://www.securify.nl/advisory/SFY20200317/zonealarm-truevector-internet-monitor-service-insecure-ntfs-permissions-vulnerability.html [2] https://www.catalog.update.microsoft.com/Search.aspx?q=KB4540673 [3] https://twitter.com/tiraniddo [4] https://github.com/googleprojectzero/symboliclink-testing-tools/tree/master/CreateHardlink


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top