exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Windows Firewall Control 6.11.0 Unquoted Service Path

Windows Firewall Control 6.11.0 Unquoted Service Path
Posted Aug 8, 2024
Authored by Milad Karimi

Windows Firewall Control version 6.11.0 suffers from an unquoted service path vulnerability.

tags | exploit
systems | windows
SHA-256 | a882c58f42ff14820df9c9336910eac40c4b435d9f10314db3d2344d3d43aff3

Windows Firewall Control 6.11.0 Unquoted Service Path

Change Mirror Download
# Exploit Title: Microsoft Windows Firewall Control 6.11.0 - Unquoted
Service Path
# Date: 2024-08-06
# Exploit Author: Milad Karimi (Ex3ptionaL)
# Contact: miladgrayhat@gmail.com
# Zone-H: www.zone-h.org/archive/notifier=Ex3ptionaL
# MiRROR-H: https://mirror-h.org/search/hacker/49626/
# Vendor Homepage: http://www.binisoft.org
# Software Link: http://www.binisoft.org
# Version: 6.11.0
# Tested on: Windows 10 Pro x64

1. Description:

Windows Firewall Control lacks of the quotes in filepath, causing it to be
a potential vector of privilege escalation attack.
To properly exploit this vulnerability, the local attacker must insert an
executable file in the path of the service. Upon service restart or system
reboot, the malicious code will be run with elevated privileges.



2. POC

C:\>sc qc "wfcs"
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: wfcs
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : "C:\Program Files\Windows Firewall
Control\wfcs.exe"
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : Windows Firewall Control
DEPENDENCIES : MpsSvc
SERVICE_START_NAME : LocalSystem


C:\>systeminfo

OS Name: Microsoft Windows 10 Pro
OS Version: 10.0.19045 N/A Build 19045
OS Manufacturer: Microsoft Corporation
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close