CVE-2021-30605

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass discretionary access controls on Windows systems running vulnerable versions of the ChromeOS Readiness Tool installer. By loosening DCOM access rights, attackers could potentially execute unauthorized actions or escalate privileges. Only Windows users who installed ChromeOS Readiness Tool versions before 1.0.2.0 are affected.

💻 Affected Systems

Products:
  • ChromeOS Readiness Tool
Versions: All versions prior to 1.0.2.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems where ChromeOS Readiness Tool was installed. ChromeOS devices themselves are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain unauthorized access to DCOM objects, potentially leading to privilege escalation, remote code execution, or complete system compromise.

🟠

Likely Case

Local attackers could bypass access controls to manipulate DCOM objects, potentially gaining elevated privileges or accessing restricted system resources.

🟢

If Mitigated

With proper access controls and updated software, the risk is limited to unauthorized DCOM object access attempts that would be blocked.

🌐 Internet-Facing: LOW - This vulnerability requires local access or ability to execute code on the target system, not directly exploitable over the internet.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this to bypass access controls, but requires specific conditions and vulnerable software installation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the Windows system and knowledge of DCOM object manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.2.0

Vendor Advisory: https://crbug.com/1240952

Restart Required: Yes

Instructions:

1. Download ChromeOS Readiness Tool version 1.0.2.0 or later from official Google sources. 2. Uninstall any previous versions. 3. Install the updated version. 4. Restart the Windows system.

🔧 Temporary Workarounds

Uninstall ChromeOS Readiness Tool

windows

Remove the vulnerable software entirely if not needed

Control Panel > Programs > Uninstall a program > Select 'ChromeOS Readiness Tool' > Uninstall

Restrict DCOM Access

windows

Manually tighten DCOM access controls using Windows security settings

dcomcnfg.exe > Component Services > Computers > My Computer > DCOM Config > Configure specific application permissions

🧯 If You Can't Patch

  • Uninstall ChromeOS Readiness Tool if not required for operations
  • Implement strict access controls and monitor for unusual DCOM object access attempts

🔍 How to Verify

Check if Vulnerable:

Check installed programs for ChromeOS Readiness Tool version earlier than 1.0.2.0 via Control Panel or PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*ChromeOS Readiness Tool*'} | Select-Object Name, Version

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*ChromeOS Readiness Tool*'} | Select-Object Version

Verify Fix Applied:

Confirm ChromeOS Readiness Tool version is 1.0.2.0 or later using same PowerShell command or program properties

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unusual DCOM activation attempts
  • Security logs with access control violations for DCOM objects

Network Indicators:

  • Local DCOM/RPC communication patterns that deviate from normal

SIEM Query:

EventID=4688 OR EventID=4662 AND ProcessName LIKE '%dcom%' AND TargetObject LIKE '%ChromeOS%'

🔗 References

📤 Share & Export