CVE-2016-10157

9.8 CRITICAL

📋 TL;DR

CVE-2016-10157 is a DLL hijacking vulnerability in Akamai NetSession that allows attackers to execute arbitrary code by placing a malicious CSUNSAPI.dll file where the application searches for it. This affects all users running the vulnerable version of Akamai NetSession software. The vulnerability is particularly dangerous because the legitimate DLL is missing, making exploitation easier.

💻 Affected Systems

Products:
  • Akamai NetSession
Versions: 1.9.3.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability specifically affects Windows systems where Akamai NetSession is installed. The CSUNSAPI.dll file is missing from the installation, making the application search for it in insecure locations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or arbitrary code execution within the context of the Akamai NetSession process, allowing attackers to install malware, steal credentials, or establish persistence.

🟢

If Mitigated

Limited impact with proper application whitelisting and user privilege restrictions preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to place the malicious DLL in a directory where Akamai NetSession will search for it. Public proof-of-concept code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.9.3.1

Vendor Advisory: https://web.archive.org/web/20170101000000*/https://blogs.akamai.com/

Restart Required: Yes

Instructions:

1. Uninstall Akamai NetSession 1.9.3.1. 2. Download and install the latest version from Akamai's official website. 3. Restart the system to ensure all components are properly loaded.

🔧 Temporary Workarounds

Create dummy CSUNSAPI.dll

windows

Create an empty or legitimate CSUNSAPI.dll file in the application directory to prevent malicious DLL loading

copy NUL "C:\Program Files\Akamai\NetSession\CSUNSAPI.dll"

Restrict write permissions

windows

Remove write permissions from directories where Akamai NetSession searches for DLLs

icacls "C:\Program Files\Akamai\NetSession" /deny Everyone:(W)

🧯 If You Can't Patch

  • Remove Akamai NetSession 1.9.3.1 completely from affected systems
  • Implement application whitelisting to prevent execution of unauthorized DLLs

🔍 How to Verify

Check if Vulnerable:

Check if Akamai NetSession version 1.9.3.1 is installed and if CSUNSAPI.dll is missing from the installation directory

Check Version:

wmic product where "name like 'Akamai%'" get version

Verify Fix Applied:

Verify that Akamai NetSession is updated to a version later than 1.9.3.1 and that CSUNSAPI.dll exists in the application directory

📡 Detection & Monitoring

Log Indicators:

  • Failed DLL loading attempts for CSUNSAPI.dll
  • Unexpected process creation from Akamai NetSession

Network Indicators:

  • Unusual outbound connections from Akamai NetSession process
  • DNS queries to suspicious domains

SIEM Query:

Process Creation where Image contains 'Akamai' AND ParentImage contains 'explorer.exe' AND CommandLine contains 'dll'

🔗 References

📤 Share & Export