CVE-2024-57394# CVE-2024-57394
A vulnerability was identified in the Qi-ANXIN Tianqing Endpoint Security Management System (tested on version 10.0). This vulnerability allows low-privilege users to restore a quarantined file to an arbitrary location, such as `C:\Windows\System32`.
An attacker can craft a malicious DLL file, restore it to `C:\Windows\System32`, and exploit known DLL hijacking vulnerabilities (e.g., LPE via StorSvc) to escalate privileges to SYSTEM.
# Reproduced Steps
Craft a malicious DLL named `sprintcsp.dll` that executes malicious commands.

Land the DLL on the target machine, the file gets quarantined.

Restore and trust the file in the EDR client.

File is successfully written to `C:\Windows\System32`.

Create `RpcClient.exe`, which leverage a DLL hijacking vulnerability in the StorSvc service to execute the malicious DLL `sprintcsp.dll`.
As a proof of concept, the DLL will create a service named `abc` and execute the binary at `C:\Users\Public\test.exe` as SYSTEM.

Reference: https://github.com/blackarrowsec/redteam-research/tree/master/LPE%20via%20StorSvc
[4.0K] /data/pocs/24c6d176ebb845e6d45e26cee3c6c1f5e9d65890
└── [1.5K] README.md
0 directories, 1 file