CVE-2021-42923

7.3 HIGH

📋 TL;DR

ShowMyPC 3606 on Windows has a DLL hijack vulnerability where attackers can place malicious code in a specific temporary directory file (wodVPN.dll) that the application loads. When ShowMyPC runs, it executes this malicious code with the user's privileges. This affects Windows users running ShowMyPC 3606.

💻 Affected Systems

Products:
  • ShowMyPC
Versions: 3606
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation. Requires attacker to place malicious DLL in specific temporary directory path.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise if user runs ShowMyPC as administrator, allowing privilege escalation and complete control of the system.

🟠

Likely Case

Malicious code execution with user privileges, potentially leading to data theft, persistence mechanisms, or lateral movement within the network.

🟢

If Mitigated

Limited impact if user runs with minimal privileges and proper endpoint security blocks malicious DLL execution.

🌐 Internet-Facing: LOW - Exploitation requires local access or ability to write to the user's temporary directory.
🏢 Internal Only: MEDIUM - Internal attackers with access to target systems could exploit this for privilege escalation or persistence.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to write to %temp%\ShowMyPC\-ShowMyPC3606\ directory. DLL hijacking is well-understood attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://showmypc.com

Restart Required: No

Instructions:

No official patch available. Consider upgrading to newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Restrict Write Permissions

windows

Set restrictive permissions on the vulnerable directory to prevent unauthorized DLL placement.

icacls "%temp%\ShowMyPC\-ShowMyPC3606" /deny Everyone:(OI)(CI)(W)

Application Whitelisting

windows

Implement application control policies to prevent execution of unauthorized DLLs from temporary directories.

🧯 If You Can't Patch

  • Run ShowMyPC with minimal user privileges (never as administrator)
  • Monitor for suspicious DLL creation in %temp%\ShowMyPC\-ShowMyPC3606\ directory

🔍 How to Verify

Check if Vulnerable:

Check if ShowMyPC 3606 is installed and if %temp%\ShowMyPC\-ShowMyPC3606\wodVPN.dll exists or can be written to.

Check Version:

Check ShowMyPC about dialog or installed programs list for version 3606

Verify Fix Applied:

Verify directory permissions prevent unauthorized writes or that newer version without vulnerability is installed.

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for ShowMyPC loading DLLs from temporary directories
  • File creation events in %temp%\ShowMyPC\-ShowMyPC3606\

Network Indicators:

  • Unusual outbound connections from ShowMyPC process

SIEM Query:

Process Creation where Image contains 'ShowMyPC' and CommandLine contains 'wodVPN.dll' OR File Creation where TargetFilename contains 'ShowMyPC\\-ShowMyPC3606\\wodVPN.dll'

🔗 References

📤 Share & Export