CVE-2021-36924

7.8 HIGH

📋 TL;DR

This vulnerability in Realtek RtsUpx USB Utility Driver allows local low-privileged users to execute arbitrary code with elevated privileges via a crafted Device IO Control packet. It affects systems using Realtek USB camera/hub/audio devices with vulnerable driver versions. Attackers can achieve privilege escalation, denial of service, or full system compromise.

💻 Affected Systems

Products:
  • Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio
Versions: through 1.14.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Realtek USB devices that use the vulnerable driver. Driver may be bundled with various Realtek USB hardware products.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM/root privileges, enabling persistent backdoors, data theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install malware, or access restricted system resources.

🟢

If Mitigated

Limited to denial of service or failed exploitation attempts if proper endpoint protection and least privilege principles are enforced.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any compromised low-privileged account on affected systems can escalate to full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but low complexity once local access is obtained. Public technical details and proof-of-concept information available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.14.0.0

Vendor Advisory: https://www.realtek.com/images/safe-report/Realtek_RtsUpx_Security_Advisory_Report.pdf

Restart Required: Yes

Instructions:

1. Download updated driver from Realtek website or device manufacturer. 2. Uninstall current RtsUpx driver. 3. Install updated driver. 4. Restart system.

🔧 Temporary Workarounds

Restrict driver access

windows

Modify driver permissions to restrict low-privileged user access

sc sdset RtsUpx D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

Disable vulnerable driver

windows

Prevent driver from loading via registry or group policy

reg add "HKLM\SYSTEM\CurrentControlSet\Services\RtsUpx" /v Start /t REG_DWORD /d 4 /f

🧯 If You Can't Patch

  • Implement strict least privilege principles to limit local user access
  • Deploy endpoint protection with driver control and exploit prevention capabilities

🔍 How to Verify

Check if Vulnerable:

Check driver version in Device Manager under 'System devices' for RtsUpx or run: driverquery | findstr RtsUpx

Check Version:

driverquery /v | findstr /i RtsUpx

Verify Fix Applied:

Verify driver version is greater than 1.14.0.0 and test with known exploit attempts

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4697 (Service installed), suspicious driver loads, unexpected privilege escalation events

Network Indicators:

  • Unusual outbound connections following local privilege escalation

SIEM Query:

EventID=4697 AND ServiceName="RtsUpx" OR ProcessName="RtsUpx.sys" AND CommandLine CONTAINS "IOCTL"

🔗 References

📤 Share & Export