CVE-2021-42994
📋 TL;DR
CVE-2021-42994 is a buffer overflow vulnerability in Donglify's IOCTL handler that allows local attackers to execute arbitrary code with kernel privileges or cause denial of service via memory corruption. This affects systems running vulnerable versions of Donglify software, primarily in cloud environments using USB-over-Ethernet functionality. Attackers need local access to exploit this vulnerability.
💻 Affected Systems
- Donglify
- USB-over-Ethernet software
📦 What is this software?
Donglify by Donglify
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via kernel-mode arbitrary code execution leading to full administrative control, data theft, and persistent backdoor installation.
Likely Case
Privilege escalation from standard user to SYSTEM/root privileges, enabling lateral movement and installation of malware.
If Mitigated
Limited impact if proper access controls prevent local user access to vulnerable systems or if vulnerable software is not installed.
🎯 Exploit Status
Exploitation requires local access but is relatively straightforward once local access is obtained. The vulnerability is in a documented IOCTL handler with known buffer overflow patterns.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.7.14110 and later
Vendor Advisory: https://www.sentinelone.com/labs/usb-over-ethernet-multiple-privilege-escalation-vulnerabilities-in-aws-and-other-major-cloud-services/
Restart Required: Yes
Instructions:
1. Download latest Donglify version from official vendor site. 2. Uninstall current vulnerable version. 3. Install patched version 1.7.14110 or later. 4. Restart system to ensure kernel driver updates take effect.
🔧 Temporary Workarounds
Remove Donglify software
allUninstall Donglify completely if USB-over-Ethernet functionality is not required
Control Panel > Programs > Uninstall Donglify
sudo apt remove donglify (Linux)
sudo yum remove donglify (Linux)
Restrict IOCTL access
windowsUse application control policies to restrict access to vulnerable IOCTL codes
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized local user access to affected systems
- Use application whitelisting to prevent execution of potential exploit code
🔍 How to Verify
Check if Vulnerable:
Check Donglify version: Windows - Check Programs and Features; Linux - Check package version. Verify version is between 1.0.12309 and 1.7.14110.
Check Version:
Windows: wmic product where name='Donglify' get version | Linux: donglify --version or rpm -q donglify
Verify Fix Applied:
Confirm Donglify version is 1.7.14110 or later. Test that USB-over-Ethernet functionality still works properly.
📡 Detection & Monitoring
Log Indicators:
- Unusual IOCTL calls to device driver
- Processes spawning with SYSTEM privileges from user accounts
- Crash dumps from kernel mode
Network Indicators:
- Not applicable - local exploitation only
SIEM Query:
EventID=4688 AND NewProcessName='*' AND ParentProcessName='*' AND SubjectUserName!='SYSTEM' AND TokenElevationType='%%1938'