CVE-2021-31859

7.8 HIGH

📋 TL;DR

This vulnerability allows local users on systems running YSoft SafeQ 6 to escalate privileges by overwriting the MU55 FlexiSpooler service executable via alternative data streams. Attackers can gain SYSTEM-level access by exploiting incorrect file permissions. Only organizations using YSoft SafeQ 6 version 6.0.55 are affected.

💻 Affected Systems

Products:
  • YSoft SafeQ 6
Versions: 6.0.55
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system running the vulnerable FlexiSpooler service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM privileges, enabling complete system compromise, data theft, installation of persistent malware, and lateral movement across the network.

🟠

Likely Case

Local user or malware with initial access escalates to SYSTEM to install additional payloads, disable security controls, and maintain persistence on the compromised system.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring existing local access to the system.
🏢 Internal Only: HIGH - Internal users or compromised accounts can exploit this to gain full system control on affected print servers.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access but uses simple file permission bypass techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 6.0.55

Vendor Advisory: https://www.ysoft.com/en/legal/ysoft-safeq-flexispooler

Restart Required: Yes

Instructions:

1. Download latest YSoft SafeQ 6 version from vendor portal. 2. Backup current configuration. 3. Run installer to upgrade. 4. Restart affected systems. 5. Verify service is running with correct permissions.

🔧 Temporary Workarounds

Restrict file permissions on FlexiSpooler executable

windows

Manually set proper ACLs to prevent unauthorized modification of the MU55 FlexiSpooler service executable.

icacls "C:\Program Files\YSoft\SafeQ\FlexiSpooler\MU55FlexiSpooler.exe" /inheritance:r /grant "SYSTEM:(F)" /grant "Administrators:(F)" /deny "Users:(M)"

Disable alternative data streams

windows

Configure systems to prevent creation of alternative data streams which are used in the exploit.

fsutil behavior set disablelastaccess 1
Implement Group Policy to restrict ADS creation

🧯 If You Can't Patch

  • Isolate affected systems from critical network segments.
  • Implement strict access controls and monitoring on systems running vulnerable versions.

🔍 How to Verify

Check if Vulnerable:

Check YSoft SafeQ version in Control Panel > Programs and Features. If version is 6.0.55, system is vulnerable.

Check Version:

wmic product where "name like 'YSoft SafeQ%'" get version

Verify Fix Applied:

Verify version is greater than 6.0.55 and check file permissions on MU55FlexiSpooler.exe using: icacls "C:\Program Files\YSoft\SafeQ\FlexiSpooler\MU55FlexiSpooler.exe"

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modifications to MU55FlexiSpooler.exe in Windows Security logs
  • Service restart events for FlexiSpooler service
  • Creation of alternative data streams on executable files

Network Indicators:

  • Unusual outbound connections from print servers
  • Lateral movement attempts from print server systems

SIEM Query:

EventID=4663 AND ObjectName LIKE '%MU55FlexiSpooler.exe%' AND Accesses='WRITE_DAC' OR Accesses='WRITE_OWNER'

🔗 References

📤 Share & Export