CVE-2019-25308
📋 TL;DR
CVE-2019-25308 is an unquoted service path vulnerability in Mikogo's Windows service that allows attackers with local access to execute arbitrary code with SYSTEM privileges. This affects Mikogo 5.2.2.150317 installations on Windows systems. Attackers can exploit this by placing malicious executables in specific path locations that the service attempts to load.
💻 Affected Systems
- Mikogo
📦 What is this software?
Mikogo by Mikogo
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with LocalSystem privileges, allowing complete control over the affected Windows system, data theft, lateral movement, and persistence establishment.
Likely Case
Local privilege escalation from a lower-privileged user account to SYSTEM, enabling installation of malware, backdoors, or credential harvesting.
If Mitigated
Limited impact due to proper access controls preventing local attackers from writing to service path directories.
🎯 Exploit Status
Exploit requires local access to write files to specific directories. Public exploit code is available on Exploit-DB.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later versions of Mikogo (check vendor for specific fixed version)
Vendor Advisory: https://www.vulncheck.com/advisories/mikogo-mikogo-service-unquoted-service-path
Restart Required: Yes
Instructions:
1. Upgrade Mikogo to the latest version. 2. Verify the service path is properly quoted in the Windows service configuration. 3. Restart the Mikogo-Service.
🔧 Temporary Workarounds
Add quotes to service path
windowsManually edit the Windows service configuration to add quotes around the service executable path
sc config "Mikogo-Service" binPath= "\"C:\Program Files\Mikogo\Mikogo-Service.exe\""
Restrict directory permissions
windowsSet strict ACLs on directories in the service path to prevent unauthorized file creation
icacls "C:\Program Files\Mikogo" /deny Users:(OI)(CI)W
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized users from writing to directories in the service path
- Monitor for suspicious file creation in Mikogo installation directories and service path locations
🔍 How to Verify
Check if Vulnerable:
Check if Mikogo-Service path is unquoted: sc qc "Mikogo-Service" | findstr BINARY_PATH_NAME
Check Version:
Check Mikogo version in Control Panel > Programs and Features or via the application interface
Verify Fix Applied:
Verify service path has quotes: sc qc "Mikogo-Service" | findstr BINARY_PATH_NAME should show quoted path
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs showing unexpected service restarts
- Security logs showing file creation in Mikogo directories by non-admin users
Network Indicators:
- Unusual outbound connections from Mikogo-Service process
SIEM Query:
EventID=4688 AND NewProcessName LIKE '%Mikogo-Service%' AND SubjectUserName NOT IN (admin_users)