POC详情: 33ca9878a569cb09c0bf9da90c6f5db46000fd82

来源
关联漏洞
标题: Lenovo Elliptic Labs Virtual Lock Sensor 安全漏洞 (CVE-2025-0886)
描述:Lenovo Elliptic Labs Virtual Lock Sensor是中国联想(Lenovo)公司的一款虚拟锁传感器。可检测用户何时出现在 PC/笔记本电脑系统前。 Lenovo Elliptic Labs Virtual Lock Sensor存在安全漏洞,该漏洞源于权限分配不当,可能导致本地认证用户权限提升。
描述
Local privilege escalation exploit for CVE-2025-0886.
介绍
# VirtualLockSensorLPE
## Description

Local privilege escalation PoC exploit for CVE-2025-0886 that targets Elliptic Virtual Lock Sensor version 3.1.60531.2 running on Windows, which is installed by default on certain Lenovo laptop models. Allows execution of a payload in the context of `SYSTEM` from a regular user context by changing the permissions on a registry key.

Official advisory from Lenovo: https://support.lenovo.com/us/en/product_security/LEN-182738

Please read the [Notes](#notes) before using it.

## How to Build

1. Clone the repository with `git clone --recursive`.
2. Build the OffWinLib project from the OffWinLib solution to ensure that dependencies are installed properly.
3. Build the VirtualLockSensorLPE solution.

## How to Use

`VirtualLockSensorLPE.exe COMMAND`

### Example

`VirtualLockSensorLPE.exe "cmd /c echo test > C:\Windows\System32\poc.txt"`

![Screenshot](poc.png)

## Technical Details

Vulnerable versions of Elliptic Virtual Lock Sensor use the following registry keys where `Everyone` has `Full Control`:
- `HKLM\SOFTWARE\Elliptic Labs\Virtual Lock Sensor\UserSettings\OnBattery`
- `HKLM\SOFTWARE\Elliptic Labs\Virtual Lock Sensor\UserSettings\PluggedIn`

Regular users can initiate a reinstall of the software. If a subkey with "container inherit" enabled is created under one of the registry keys listed above, and a registry link is then created under that new key, `Everyone` will be granted `Full Control` on the target of that link during reinstall.

The PoC exploits the vulnerability using the following steps:
1. Create a subkey (named `a`) under `HKLM\SOFTWARE\Elliptic Labs\Virtual Lock Sensor\UserSettings\PluggedIn` where `Everyone` has `Full Control` with "container inherit" ("CI" flag) enabled.
2. Create a registry link (named `b`) under the newly created subkey (`a`) pointing to `HKLM\SYSTEM\CurrentControlSet\Services\edgeupdate`.
3. Force a reinstall of Elliptic Virtual Lock Sensor.
4. Since `Everyone` now has `Full Control` on the `edgeupdate` key, the `ImagePath` value of the key can be modified to point to a payload.
5. Start the `edgeupdate` (Microsoft Edge Update Service) service to execute the payload in the context of `SYSTEM`.

## Notes
- **The exploit does not attempt to reset the permissions on the `HKLM\SYSTEM\CurrentControlSet\Services\edgeupdate` registry key, so you will have to do that manually (and please remember to do that if you are testing this on a production system).**
- Specifically targets version 3.1.60531.2. The exploit code might require some modifications to target other vulnerable versions (the product code passed to `MsiReinstallProductW` will likely have to be changed to initiate the reinstall).
- There are different ways to turn an arbitrary registry key write into privileged code execution. This PoC achieves it by changing the configuration of an existing service (`edgeupdate`) to point to an arbitrary payload. This technique has a couple of limitations:
	- If the `edgeupdate` service is already running when the exploit is executed, the payload will not be executed. Wait a minute or two and run the exploit again.
	- If the payload is not a service binary (e.g. `cmd`), Windows will stop the execution of it after a short while.
文件快照

[4.0K] /data/pocs/33ca9878a569cb09c0bf9da90c6f5db46000fd82 ├── [1.0K] LICENSE.txt ├── [4.0K] OffWinLib ├── [148K] poc.png ├── [3.2K] README.md ├── [4.0K] VirtualLockSensorLPE │   ├── [4.3K] main.cpp │   ├── [ 171] packages.config │   ├── [8.2K] VirtualLockSensorLPE.vcxproj │   └── [1.0K] VirtualLockSensorLPE.vcxproj.filters └── [2.0K] VirtualLockSensorLPE.sln 2 directories, 8 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。