Skip to content

Local Privilege Escalation vulnerability in MSI Center Application

Notifications You must be signed in to change notification settings

nam3lum/msi-central_privesc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

Local privilege escalation in MSI Center desktop application.

CVE-2022-xxxxx

The vulnerability exist in "C_Features" of MSI.CentralServer.exe. MSI.CentralServer.exe is an application that gathers information about your system, it collaborates with MSI.TerminalServer.exe. The ExecuteTask function which we can call it in "CMD_AutoUpdateSDK" gives us a chance to run an exectable with custom parameters under Administrative privileges. You can see the related port only from localhost.

Vulnerable process & port

The vulnerability

You can easily disassemble the MSI.CentralServer.exe using any .NET disassembler. Central Server itself listens on 32682 port from localhost, we can find the source code of the handler in "C_Features". Just look at the CMD_AutoUpdateSDK feature to see the vulnerability. We abuse this feature (it is automatic updater of MSI Center). It receives the user-given payload, splits it into multiple parts to execute the command with custom parameters. Vulnerable feature

This is main function which our feature uses it to execute given PE with custom arguments: Main function

The port which MSI Central Server listens is updated in 1.0.59.0 version. It is 32683.

POC

You can generate your own payload, hex it and run the script in the local computer. The POC creates hacker user with "hacker123" password and adds it to the Administrators group.

Proof-of-Concept video: https://user-images.githubusercontent.com/64528432/188067866-f30fe089-db76-4cc0-81ce-f74871769b33.mp4

About

Local Privilege Escalation vulnerability in MSI Center Application

Resources

Stars

Watchers

Forks

Languages