CVE-2023-7241 ‒ Local Privilege Escalation in Webroot Endpoint Protection

Authored by:
Metrics: cve.org

Description

Webroot Endpoint Protection is a security product that protects endpoints from malware and detects attacks. The fixed vulnerability enabled attackers with existing access to a system to elevate their privileges to SYSTEM.

Vulnerability

The vulnerability abused a trust relationship between frontend processes running in the context of an unprivileged user and privileged backend processes running as SYSTEM.

It was possible to abuse COM hijacking to inject a DLL into the front-end process of Webroot Endpoint Protection. More specifically, this was possible by hijacking the interface with the GUID {AF02484C-A0A9-4669-9051-058AB12B9195}.

The frontend process has a trust relationship with the backend processes of Webroot Endpoint Protection, which run as a SYSTEM. One command that could be issued by the frontend allowed attackers to delete arbitrary files on the local system. Using the DLL injected via COM hijacking, one could issue this command to delete a file.

We used tooling provided by ZDI to exploit the file deletion to gain SYSTEM privileges.

Mitigations

Install a current version of Webroot Endpoint Protection. This vulnerability was fixed in version 9.0.35.17.

Timeline

DateAction
04.12.2023Vendor was contacted and informed about the vulnerability
05.12.2023Initial response from vendor
02.02.2024Vendor informs us that a fix is available for testing
26.02.2024Confirmed to the Vendor that the exploit was no longer possible
01.05.2024Vendor released Advisory

References

Share: