Intel(r) Management and Security Application 5.2 - UNS Unquoted Service Path
Intel(r) Management and Security Application 5.2 - User Notification Service Unquoted Service Path Privilege Escalation
Last updated
Was this helpful?
Intel(r) Management and Security Application 5.2 - User Notification Service Unquoted Service Path Privilege Escalation
Last updated
Was this helpful?
Intel(r) Management and Security Application User Notification Service (v5.2) path contains spaces and is not surrounded by quotation marks and Windows has to guess where to find the UNS executable that starts automatically. Windows will first consider the space at the end of the filename and interpret everything that follows are arguments passed to that executable.
Exploit URL: https://www.exploit-db.com/exploits/49144
If there is not Program.exe under "C:\" directory, Windows will attempt second option.
If there is not Program Files.exe under "C:\" directory , Windows will attempt third option.
If there is not Common.exe under "C:\Program Files(x86)\" directory , Windows will attempt fourth option.
If there is not Privacy.exe under "C:\Program Files (x86)\Common Files\Intel\" directory , Windows will attempt fifth option.
If an user has permission to write one of these directories, mandatory level of user will be elevated as SYSTEM during reboot Windows 7 / 8 machine.
I have discovered this vulnerability on Intel User Notification Service 5.2 , maybe other versions are lower than 5.2 that are affected as well. Privacy.exe was created with mfsvenom and served on port 80. Also, port 443 was used for reverse shell so if there is a firewall in front of target machine, outbound firewall rules allow 80, 443, 53 ports usually.
Using following commands, I elevated mandatory level from high to SYSTEM without special misconfiguration on directory.
exploit.bat: