CVE-2021-25695

7.8 HIGH

📋 TL;DR

This vulnerability in Teradici PCOIP Software Agent's USB vHub allows any program to send commands to the driver, potentially enabling privilege escalation by altering program execution flow. It affects systems running Teradici PCOIP Software Agent before version 21.07.0. Attackers could exploit this to gain elevated privileges on compromised systems.

💻 Affected Systems

Products:
  • Teradici PCOIP Software Agent
Versions: All versions prior to 21.07.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Windows and Linux versions of the PCOIP Software Agent. The vulnerability is in the USB virtual hub component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing installation of persistent malware, data theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation from a standard user to SYSTEM/root level access, enabling further malicious activities on the compromised host.

🟢

If Mitigated

Limited impact with proper network segmentation and endpoint protection that detects unusual driver behavior.

🌐 Internet-Facing: LOW - This requires local access or ability to execute code on the target system first.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system, this vulnerability provides an easy path to privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to execute code, but the vulnerability itself is straightforward to exploit once code execution is achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.07.0

Vendor Advisory: https://advisory.teradici.com/security-advisories/100/

Restart Required: Yes

Instructions:

1. Download Teradici PCOIP Software Agent version 21.07.0 or later from the Teradici website. 2. Install the update following Teradici's installation guide. 3. Restart the system to ensure the updated driver loads properly.

🔧 Temporary Workarounds

Disable USB Redirection

all

Disable USB device redirection in PCOIP settings to reduce attack surface

Restrict Local Access

all

Implement strict access controls to prevent unauthorized local code execution

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized programs from running
  • Deploy endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check the Teradici PCOIP Software Agent version. If it's below 21.07.0, the system is vulnerable.

Check Version:

On Windows: Check Programs and Features or run 'wmic product where name="Teradici PCOIP Software Agent" get version'. On Linux: Check package manager or run 'pcoip-agent --version' if available.

Verify Fix Applied:

Verify the installed version is 21.07.0 or higher and check that USB functionality still works properly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process interactions with Teradici USB driver
  • Failed privilege escalation attempts
  • Suspicious driver loading events

Network Indicators:

  • Unusual outbound connections from Teradici processes
  • Lateral movement attempts following local compromise

SIEM Query:

EventID=4688 OR Process Creation where Parent Process contains 'teradici' AND Command Line contains unusual parameters

🔗 References

📤 Share & Export