CVE-2021-20793
📋 TL;DR
This CVE describes an untrusted search path vulnerability in Sony Audio USB Driver and HAP Music Transfer installers. Attackers can place malicious DLLs in directories searched by these installers, leading to privilege escalation and arbitrary code execution. Users of affected Sony software versions are vulnerable.
💻 Affected Systems
- Sony Audio USB Driver
- HAP Music Transfer
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with administrative privileges, allowing installation of persistent malware, data theft, and complete control of the affected system.
Likely Case
Local privilege escalation leading to installation of additional malware, credential theft, or lateral movement within the network.
If Mitigated
Limited to local user context with proper application whitelisting and DLL search path restrictions in place.
🎯 Exploit Status
Requires local access to place malicious DLL and knowledge of installer search paths. Social engineering could trick users into running installers from compromised locations.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to versions after Sony Audio USB Driver V1.10 and HAP Music Transfer Ver.1.3.0
Vendor Advisory: https://www.sony.co.uk/electronics/support/software/00266642
Restart Required: Yes
Instructions:
1. Visit Sony support pages for affected products. 2. Download and install updated versions. 3. Restart system after installation. 4. Verify installation completed successfully.
🔧 Temporary Workarounds
Restrict DLL search paths
windowsUse Windows policies to restrict DLL search paths and prevent loading from untrusted directories
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -Name 'SafeDllSearchMode' -Value 1
Application whitelisting
windowsImplement application control policies to only allow trusted installers to run
🧯 If You Can't Patch
- Remove or disable affected Sony software if not required
- Implement strict user privilege management to limit local attack surface
🔍 How to Verify
Check if Vulnerable:
Check installed software versions: Sony Audio USB Driver ≤ V1.10 or HAP Music Transfer ≤ Ver.1.3.0
Check Version:
wmic product get name,version | findstr /i "sony"
Verify Fix Applied:
Verify installed versions are newer than affected versions through Control Panel or software properties
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs showing DLL loading from unusual paths
- Process creation events for Sony installers from unexpected locations
Network Indicators:
- Unusual outbound connections following installer execution
- DNS queries to suspicious domains after software installation
SIEM Query:
EventID=4688 AND (ProcessName LIKE '%sony%' OR ProcessName LIKE '%install%') AND CommandLine CONTAINS '.dll'
🔗 References
- https://jvn.jp/en/jp/JVN80288258/index.html
- https://www.sony.co.uk/electronics/support/software/00266642
- https://www.sony.co.uk/electronics/support/software/00266749
- https://www.sony.co.uk/electronics/support/software/00266758
- https://jvn.jp/en/jp/JVN80288258/index.html
- https://www.sony.co.uk/electronics/support/software/00266642
- https://www.sony.co.uk/electronics/support/software/00266749
- https://www.sony.co.uk/electronics/support/software/00266758