Alaatk / CVE-2024-34474

Clario through 2024-04-11 for Windows Desktop has weak permissions for %PROGRAMDATA%\Clario and tries to load DLLs from there as SYSTEM.

Repository from Github https://github.comAlaatk/CVE-2024-34474Repository from Github https://github.comAlaatk/CVE-2024-34474

CVE-2024-34474

Clario through 2024-04-11 for Windows Desktop has weak permissions for %PROGRAMDATA%\Clario and tries to load DLLs from there as SYSTEM.

Description:

Clario for Windows desktop application attempts to load non existent DLLs libraries from C:\ProgramData\Clario\ and C:\ProgramData\Clario\Engines\ when a user performs an Antivirus scan. The DLL files do not exist and this process is invoked with SYSTEM privileges even if a non admin performs it. By default, on windows systems, any authenticated users can create files/Folders under the c:\ProgramData\Clario path. A user with low privileges can create the DLL files under C:\ProgramData\Clario\ and C:\ProgramData\Clario\Engines\ to execute arbitrary code of their choice resulting in elevation of Privileges to the SYSTEM rights.

Affected versions

Clario versions through 2024-04-11

Impacted service(s)

Insecure Folders: C:\ProgramData\Clario\ & C:\ProgramData\Clario\Engines\

Service: ClarioService.exe

DLL loaded from world-writable directory

Alt text

Discovered by:

Alaa Kachouh

About

Clario through 2024-04-11 for Windows Desktop has weak permissions for %PROGRAMDATA%\Clario and tries to load DLLs from there as SYSTEM.