ID

VAR-E-201609-0173


TITLE

Netgear Genie 2.4.32 Privilege Escalation

Trust: 0.5

sources: PACKETSTORM: 138925

DESCRIPTION

Netgear Genie version 2.4.32 suffers from an unquoted service path elevation of privilege vulnerability.

Trust: 0.5

sources: PACKETSTORM: 138925

AFFECTED PRODUCTS

vendor:netgearmodel:geniescope:eqversion:2.4.32

Trust: 0.5

sources: PACKETSTORM: 138925

EXPLOIT

# Exploit Title: Netgear Genie 2.4.32 Unquoted Service Path Elevation of Privilege
# Date: 30/09/2016
# Exploit Author: Tulpa
# Contact: tulpa@tulpa-security.com
# Author website: www.tulpa-security.com
# Vendor Homepage: www.netgear.com
# Software Link: https://www.netgear.com/home/discover/apps/genie.aspx?

cid=wmt_netgear_organic
# Version: Software Version 2.4.32
# Tested on: Windows 7 x86
# Shout-out to carbonated and ozzie_offsec

1. Description:

Netgear Genie installs a service called 'NETGEARGenieDaemon' with an unquoted service

path running with SYSTEM privileges.
This could potentially allow an authorized but non-privileged local
user to execute arbitrary code with elevated privileges on the system.

2. Proof

C:\Program Files>sc qc NETGEARGenieDaemon
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: NETGEARGenieDaemon
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 3 DEMAND_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : C:\Program Files\NETGEAR Genie\bin\NETGEARGenieDaemon.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : NETGEARGenieDaemon
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem


3. Exploit:

A successful attempt would require the local user to be able to insert their
code in the system root path undetected by the OS or other security applications
where it could potentially be executed during application startup or reboot.
If successful, the local user's code would execute with the elevated privileges
of the application.

Trust: 0.5

sources: PACKETSTORM: 138925

EXPLOIT HASH

LOCAL

SOURCE

md5: 50950656a43a0ae649cdae18ee2a93d5
sha-1: f5407bbba050f28b55b39dc8debe9838a3102a08
sha-256: 2056971e0ae31e7938639d6e5878bad3c9fc7563e3f320699fe69f8f53a5d5ff
md5: 50950656a43a0ae649cdae18ee2a93d5

Trust: 0.5

sources: PACKETSTORM: 138925

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 138925

TAGS

tag:exploit

Trust: 0.5

sources: PACKETSTORM: 138925

CREDITS

Tulpa

Trust: 0.5

sources: PACKETSTORM: 138925

EXTERNAL IDS

db:PACKETSTORMid:138925

Trust: 0.5

sources: PACKETSTORM: 138925

SOURCES

db:PACKETSTORMid:138925

LAST UPDATE DATE

2022-07-27T09:32:31.292000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:138925date:2016-09-30T13:22:22