Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

11/10/2020
06:10 PM
50%
50%

Flaws in Privileged Management Apps Expose Machines to Attack

The Intel Support Assistant is the latest Windows utility to be found that could expose millions of computers to privilege-escalation attacks through file manipulation and symbolic links.

Intel issued a patch on Nov. 10, fixing a vulnerability in the way the Intel Support Assistant interacts with files that could impact millions of Windows systems and could lead to privilege-escalation attacks.

The vulnerability is the latest issue disclosed by access-security firm CyberArk during an 18-month effort to seek out specific types of patterns that could lead to vulnerabilities, analyzing widespread management utilities for flaws that would allow malware or a local attacker to gain system privileges on a victim's computer. In this case, the Intel Support Assistant interacts insecurely with nonprivileged data and directories, giving attackers the ability to execute code as the privileged program by modifying a nonprivileged file.

Related Content:

Microsoft Fixes Privilege Escalation 0Day Under Active Attack

The Changing Face of Threat Intelligence

New on The Edge: The Double-Edged Sword of Cybersecurity Insurance

The attack only requires a malicious program or user to copy malicious code to a directory used by the utility, according to Eran Shimony, a security researcher with CyberArk. The issues, which allow an attacker to manipulate files, result in raising the permissions of any malware program, giving it the ability to "do a bunch of things that you couldn't do as a mere user," the researcher says. 

"To trigger the ability is pretty simple: You abuse some of the features of the Intel Support Assistant, and through that, you can escalate into a system account," he says. "And, if you have local admin, then it is pretty much game over."

The vulnerabilities underscore the impact that simple errors — such as failing to protect the directories used by system utilities with high-level permissions or running those utilities with reduced access rights — can have on system security. Shimony's research effort, conducted over 18 months, aimed to provide "a complementary approach to fuzzing" to find new vulnerabilities. By June 2020, the CyberArk research group had discovered more than 60 distinct vulnerabilities.

The research has resulted in a series of security notices from CyberArk and advisories from affected firms about privilege-escalation vulnerabilities in a passel of system utilities — from Microsoft's Windows Defender to Dell's Update Package. 

Shimony disclosed a vulnerability in Windows Defenders in October 2019, for example, that abused symbolic links, or symlinks — files that link to other files — to allow any file to be deleted on any Windows system without the fix. A few weeks later, the researcher released details of a class of vulnerability caused by the vendors' failure to protect the directories used by their software installers. An attacker could replace an installed file with malicious code of the same name and then wait for the administrator to run the installer to run the code. Dell's Update Package, for example, would run whenever there was an update.

The researcher notified Intel of the latest vulnerability more than a year ago. The company needed time to inform all of its partners and work together on a fix, Shimony says. The notification of the Intel Support Assistant vulnerability (CVE-2020-22460) came on Tuesday.

While the vendors have released patches for the vulnerabilities, Shimony urges developers to be aware of this particular class of flaws and has two recommendations for programmers. First, developers should always protect the directories and files used by privileged programs from modification — whether creation, deletion, or manipulation — by regular users. Second, coders should always execute specific operations at the least privilege needed to manipulate local files, by adopting the appropriate role.

"Often, the privileged program can do the same things in the context of the administrator or the system, or it can do the same things in the context of the regular user," he says. "If the developer can, they should impersonate the local user whenever at all possible. If they do that, we cannot do any file manipulation attack, because we would not have the necessary permissions to do them."

The researcher also disclosed a second vulnerability in Intel's Support Assistant that is more complex to exploit and which allows an attacker to delete an arbitrary file. 

This is not the first time that the Intel Support Assistant has been a vehicle for privilege escalation. In early September, the company also issued a notice that a similar scenario — a user exploiting file permissions — can lead to escalation of privilege.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26250
PUBLISHED: 2020-12-01
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version 0.12.0 and before 0.12.2, the deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by ...
CVE-2020-28576
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information.
CVE-2020-28577
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names.
CVE-2020-28582
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents.
CVE-2020-28583
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information.