CVE-2021-44041

9.8 CRITICAL

📋 TL;DR

This vulnerability in UiPath Assistant allows attackers to execute arbitrary code or capture NTLM credentials by tricking users into clicking malicious links. It affects users of UiPath Assistant version 21.4.4 who interact with specially crafted uipath-assistant:// URIs.

💻 Affected Systems

Products:
  • UiPath Assistant
Versions: 21.4.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction (clicking malicious link) but no authentication. WebDAV or SMB file paths can be used for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution, credential theft, and lateral movement within the network.

🟠

Likely Case

Malware installation, data theft, or credential harvesting through social engineering attacks.

🟢

If Mitigated

Limited impact with proper network segmentation, application control policies, and user awareness training.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering but is technically simple once user clicks malicious URI.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.10.4 and later

Vendor Advisory: https://docs.uipath.com/robot/docs/release-notes-2021-10-4

Restart Required: Yes

Instructions:

1. Download UiPath Assistant 21.10.4 or later from official sources. 2. Uninstall current version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Disable URI Handler

windows

Remove or modify the uipath-assistant:// URI handler registration to prevent exploitation via malicious links.

reg delete "HKCU\Software\Classes\uipath-assistant" /f
reg delete "HKLM\Software\Classes\uipath-assistant" /f

Block WebDAV and SMB Outbound

windows

Prevent credential capture by blocking outbound connections to WebDAV and SMB shares from workstations.

netsh advfirewall firewall add rule name="Block WebDAV Outbound" dir=out action=block protocol=TCP remoteport=80,443,445

🧯 If You Can't Patch

  • Implement application control policies to block execution of unauthorized binaries.
  • Deploy network segmentation to isolate UiPath systems and block outbound SMB/WebDAV from workstations.

🔍 How to Verify

Check if Vulnerable:

Check UiPath Assistant version in Help > About. If version is 21.4.4, system is vulnerable.

Check Version:

"C:\Program Files\UiPath\Studio\UiPath.Assistant.exe" --version

Verify Fix Applied:

Verify version is 21.10.4 or later in Help > About. Test that uipath-assistant:// URIs no longer execute arbitrary file paths.

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for UiPath.Assistant.exe with --dev-widget arguments containing network paths
  • Windows Event Logs showing SMB or WebDAV authentication attempts from UiPath processes

Network Indicators:

  • Outbound SMB (port 445) or WebDAV (port 80/443) connections from workstations following UiPath process execution
  • DNS queries for suspicious domains in conjunction with UiPath process activity

SIEM Query:

process_name="UiPath.Assistant.exe" AND command_line="*--dev-widget*"

🔗 References

📤 Share & Export