CVE-2021-25699

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to escalate privileges by placing a malicious DLL in a specific directory when the Teradici PCoIP Software Client uses an OpenSSL component compiled without proper security flags. It affects users of Teradici PCoIP Software Client versions before 21.07.0.

💻 Affected Systems

Products:
  • Teradici PCoIP Software Client
Versions: All versions prior to 21.07.0
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the OpenSSL component compiled without the no-autoload-config option.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the running PCoIP process, potentially leading to complete control of the affected system.

🟠

Likely Case

Local privilege escalation allowing attackers to execute arbitrary code with elevated permissions on the compromised system.

🟢

If Mitigated

Limited impact if proper file permissions prevent unauthorized DLL placement or if the vulnerable component isn't accessible.

🌐 Internet-Facing: LOW - This requires local access or ability to place files in specific directories, making remote exploitation unlikely.
🏢 Internal Only: HIGH - Attackers with local access or ability to place files in build configuration directories can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to place malicious DLL in specific build configuration directory and knowledge of the directory structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.07.0 and later

Vendor Advisory: https://advisory.teradici.com/security-advisories/102/

Restart Required: Yes

Instructions:

1. Download Teradici PCoIP Software Client version 21.07.0 or later from official Teradici website. 2. Uninstall previous version. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Restrict directory permissions

all

Set strict file permissions on build configuration directories to prevent unauthorized DLL placement.

chmod 700 /path/to/build/config/directory (Linux)
icacls "C:\path\to\build\config\directory" /deny Everyone:(OI)(CI)F (Windows)

🧯 If You Can't Patch

  • Implement strict file system permissions to prevent unauthorized users from writing to build configuration directories.
  • Monitor for suspicious DLL files in build configuration directories and implement application whitelisting.

🔍 How to Verify

Check if Vulnerable:

Check Teradici PCoIP Software Client version in application settings or About dialog.

Check Version:

On Windows: Check program version in Control Panel > Programs and Features. On Linux: dpkg -l | grep pcoip or rpm -qa | grep pcoip

Verify Fix Applied:

Verify installed version is 21.07.0 or later and check that OpenSSL configuration autoloading is disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loading from build configuration directories
  • Failed privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from PCoIP process

SIEM Query:

EventID=4688 AND ProcessName="pcoip*" AND CommandLine CONTAINS "dll" AND ParentProcessName="explorer.exe"

🔗 References

📤 Share & Export