SafeBreach discloses major vulnerabilities in popular software

Tech Online Things

SafeBreach Labs has published three major vulnerability disclosures which concern three popular and widely-used software products.

The first deals with Trend Micro’s antivirus product Trend Micro Security 16, the second concerns Kaspersky’s VPN product Kaspersky Secure Connection and the third involves the Autodesk Desktop Application.

SafeBreach discovered that all of these products contain security flaws which can lead to privilege escalation and persistence by loading an arbitrary unsigned DLL into a service that runs as NT Authority/System.

This is exactly the same type of flaw that the firm disclosed in BitDefender Antivirus Free 2020 back in September.

Unsigned DLL

SafeBreach’s team has written “proof of concept” code to demonstrate how they were able to compile a replacement DLL file and set it to load instead of the legitimate one for Trend Micro Security 16, Kaspersky Secure Connection and Autodesk.

The firm’s replacement DLL files lead to privilege escalation through code execution at the highest authority level since none of the three products have any kind of DLL validation procedure in place. To make matters worse, these security products are typically set to auto-launch when a user turns on their system which means that any malicious payloads will also be persistent.

SafeBreach reported the vulnerabilities to the software vendors in July and all three companies confirmed them within a few weeks. Trend Micro published a security advisory first on November 25 for CVE-2019-15628 and this was followed by Autodesk releasing a security advisory of its own a day later for CVE-2019-7365. Kaspersky provided regular status updates for its customers concerning the CVE-2019-15689 vulnerability.

Trend Micro has patched the problem already with the release of version 16.0.1227 of Trend Micro Security 2016 and users running any version below 16.0.1221 should update their software immediately. Kaspersky and Autodesk are also working on patches and users should patch their software when these fixes become available.

Via TechNadu

Leave a Reply

Your email address will not be published. Required fields are marked *