CVE-2021-30110
📋 TL;DR
This vulnerability in Domain Time II's dttray.exe allows remote attackers to execute arbitrary code by spoofing update server responses. Attackers can send malicious URLs in response to UDP update queries, leading to code execution on affected systems. Organizations using Domain Time II before version 5.2.b.20210331 are affected.
💻 Affected Systems
- Greyware Automation Products Domain Time II
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining administrative privileges, installing persistent backdoors, and moving laterally through the network.
Likely Case
Initial foothold on target system leading to data exfiltration, credential theft, or ransomware deployment.
If Mitigated
Attack blocked at network perimeter or detected before successful exploitation, with minimal impact.
🎯 Exploit Status
Exploitation requires network access to the target and ability to spoof update server responses.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.2.b.20210331 or later
Vendor Advisory: https://www.greyware.com/software/domaintime/v5/installation/v5x.asp#currentVersion
Restart Required: Yes
Instructions:
1. Download latest version from Greyware website. 2. Run installer. 3. Restart system or Domain Time II service.
🔧 Temporary Workarounds
Block UDP Update Queries
windowsPrevent dttray.exe from making UDP queries to check for updates
netsh advfirewall firewall add rule name="Block Domain Time UDP" dir=out action=block protocol=UDP remoteport=123 program="C:\Program Files\Domain Time II\dttray.exe" enable=yes
Disable Automatic Updates
windowsConfigure Domain Time II to not check for updates automatically
🧯 If You Can't Patch
- Segment network to restrict UDP traffic to/from Domain Time II systems
- Implement network monitoring for suspicious UDP traffic patterns on port 123
🔍 How to Verify
Check if Vulnerable:
Check Domain Time II version in About dialog or registry at HKEY_LOCAL_MACHINE\SOFTWARE\Greyware\Domain Time II\Version
Check Version:
reg query "HKLM\SOFTWARE\Greyware\Domain Time II" /v Version
Verify Fix Applied:
Verify version is 5.2.b.20210331 or later and test update functionality
📡 Detection & Monitoring
Log Indicators:
- Unexpected process creation from dttray.exe
- Network connections to unusual IPs from Domain Time II
Network Indicators:
- UDP traffic on port 123 to non-Greyware IPs
- HTTP/HTTPS traffic from dttray.exe to suspicious domains
SIEM Query:
process_name:dttray.exe AND (network_protocol:UDP OR destination_port:123) AND NOT destination_ip:greyware.com
🔗 References
- https://blog.grimm-co.com/2021/04/time-for-upgrade.html
- https://www.greyware.com/software/domaintime/
- https://www.greyware.com/software/domaintime/v5/installation/v5x.asp#currentVersion
- https://blog.grimm-co.com/2021/04/time-for-upgrade.html
- https://www.greyware.com/software/domaintime/
- https://www.greyware.com/software/domaintime/v5/installation/v5x.asp#currentVersion