Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-47529 PoC — RSA NetWitness Platform 安全漏洞

Source
Associated Vulnerability
Title:RSA NetWitness Platform 安全漏洞 (CVE-2022-47529)
Description:Dell EMC RSA NetWitness Platform是美国戴尔(Dell)公司的一套网络安全监控平台。 RSA NetWitness Platform 12.2之前版本存在安全漏洞,该漏洞源于允许本地和管理员帐户修改端点代理服务配置,从而绕过篡改保护功能ACL修改。
Description
RSA NetWitness Platform EDR Agent / Incorrect Access Control - Code Execution
Readme
# CVE-2022-47529
RSA NetWitness Platform EDR Agent / Incorrect Access Control - Code Execution

During a security audit of the EDR agent I discovered a novel vector to tamper with the service with only standard user rights by targeting an insecure Win32 memory event object. Hijacking the service config can also be done if running the exploit as admin.

CVE-2022-47529 allows local users to stop the Endpoint Windows agent from sending the events to SIEM or make the agent run user-supplied commands.

Insecure Win32 memory objects in Endpoint Windows Agents in the NetWitness Platform through 12.x allow local
and admin Windows user accounts to modify the endpoint agent service configuration:
to either disable it completely or run user-supplied code or commands, thereby bypassing tamper-protection features via ACL modification.

Interestingly, the agent was uploaded to virustotal on 2022-01-05 17:24:32 UTC months before finding and report.

SHA-256 770005f9b2333bf713ec533ef1efd2b65083a5cfb9f8cbb805ccb2eba423cc3d
LANDeskService.exe

[Network Access]
Local


[References]
https://community.netwitness.com/t5/netwitness-platform-security/nw-2023-04-netwitness-platform-security-advisory-cve-2022-47529/ta-p/696935

File Snapshot

[4.0K] /data/pocs/8a2e88231062df2b63e05c1e0b5ed84fbfe543a5 ├── [1.0K] LICENSE ├── [1.2K] README.md └── [6.0K] RSA_NetWitness_Exploit.c 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.