Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-3368 PoC — Software Updater of Avira Security for Windows vulnerable to Privilege Escalation

Source
Associated Vulnerability
Title:Software Updater of Avira Security for Windows vulnerable to Privilege Escalation (CVE-2022-3368)
Description:A vulnerability within the Software Updater functionality of Avira Security for Windows allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avira Security version 1.1.72.30556.
Readme
# CVE-2022-3368

PoC for arbitrary file move vulnerability in Software Update component of Avira Security.
Users have option to use this feature to update any outdated software on their PC ,when this feature is used Avira Security service will drop downloaded files in c:\ProgramData\Avira\Security\Temp. First file that is created in subdirectory is in format <random 4 numbers>_\<filename> then later this file is moved to just \<filename> (leading numbers and underscore are removed).This directory have DACL's that dont allow unprivileged users to modify/delete newly created files  but  it will allow user to create junction. This can abused by creating junction point to user controlled directory which have more permissive DACL's , this way when new files are created in subdirectories user will be able to modify them and leverage it to obtain arbitrary file move which leads to LPE by writing dll in system32 directory that is later loaded by privileged service.

Current PoC will load dll in windows update service, dll dont implement any kind of mutex to check if exploit was already executed which result in creating multiple cmd.exe process as dll is loaded multiple times.



https://user-images.githubusercontent.com/44291883/196391684-c3399f9e-6add-407f-aee0-0f548b48582c.mp4



# Advisory 

https://support.norton.com/sp/static/external/tools/security-advisories.html

https://cve.report/CVE-2022-3368

File Snapshot

[4.0K] /data/pocs/800309bc35b5c6bb9575b2833df77c4f4f2bd3ec ├── [4.0K] Project3 │   ├── [2.3K] def.h │   ├── [569K] dll.h │   ├── [4.3K] FileOplock.cpp │   ├── [1.0K] FileOplock.h │   ├── [ 11K] main.cpp │   ├── [1.4K] Project3.sln │   ├── [6.7K] Project3.vcxproj │   ├── [1.3K] Project3.vcxproj.filters │   └── [ 168] Project3.vcxproj.user └── [1.4K] README.md 1 directory, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →