CVE-2021-28269

8.8 HIGH

📋 TL;DR

Soyal Technology 701Client 9.0.1 has insecure file permissions on its client.exe binary, granting the Authenticated Users group full control. This allows authenticated attackers to replace or modify the executable, potentially leading to privilege escalation or arbitrary code execution. Organizations using this specific version of Soyal 701Client are affected.

💻 Affected Systems

Products:
  • Soyal Technology 701Client
Versions: 9.0.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where the client.exe binary has been installed with insecure permissions granting Authenticated Users full control.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers replace client.exe with malicious code, gaining SYSTEM-level privileges and complete control over the system, potentially leading to domain compromise.

🟠

Likely Case

Authenticated users replace the binary to gain elevated privileges, install backdoors, or execute arbitrary code with higher permissions.

🟢

If Mitigated

With proper permissions hardening, only authorized administrators can modify the binary, preventing exploitation.

🌐 Internet-Facing: LOW - This requires authenticated access to the system, typically not directly internet-facing.
🏢 Internal Only: HIGH - Any authenticated user on the network could potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once access is obtained. Public exploit code demonstrates the permission issue.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not publicly available

Restart Required: No

Instructions:

No official patch available. Apply workarounds to secure file permissions.

🔧 Temporary Workarounds

Secure client.exe permissions

windows

Remove Full Control permissions from Authenticated Users group on client.exe binary

icacls "C:\Program Files\Soyal\701Client\client.exe" /remove "Authenticated Users"
icacls "C:\Program Files\Soyal\701Client\client.exe" /grant "Administrators:(F)"

🧯 If You Can't Patch

  • Restrict access to systems running 701Client to only authorized users
  • Implement application whitelisting to prevent execution of unauthorized binaries

🔍 How to Verify

Check if Vulnerable:

Check permissions on client.exe: icacls "C:\Program Files\Soyal\701Client\client.exe" and look for 'Authenticated Users:(F)'

Check Version:

Check program version in Control Panel > Programs and Features or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall

Verify Fix Applied:

Verify Authenticated Users no longer have Full Control permissions on client.exe

📡 Detection & Monitoring

Log Indicators:

  • Windows Security event logs showing file permission changes on client.exe
  • Process creation events for unexpected binaries

Network Indicators:

  • Unusual network connections from 701Client systems
  • Traffic to unexpected destinations

SIEM Query:

EventID=4663 AND ObjectName="*client.exe" AND Accesses="WRITE_DAC" OR Accesses="WRITE_OWNER"

🔗 References

📤 Share & Export