CVE-2022-0192

7.3 HIGH

📋 TL;DR

This DLL search path vulnerability in Lenovo PCManager allows attackers to place malicious DLLs in directories searched by the application, potentially leading to privilege escalation. It affects users running Lenovo PCManager versions prior to 4.0.40.2175 on Windows systems. Attackers could execute arbitrary code with elevated privileges if they can place DLLs in accessible locations.

💻 Affected Systems

Products:
  • Lenovo PCManager
Versions: All versions prior to 4.0.40.2175
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Lenovo PCManager to be installed and running on Windows systems. The vulnerability exists in the DLL loading mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM/administrator privileges, allowing installation of persistent malware, credential theft, and complete control of the affected system.

🟠

Likely Case

Local privilege escalation from standard user to administrator/SYSTEM privileges, enabling further lateral movement within the network.

🟢

If Mitigated

Limited impact if proper application whitelisting and DLL search path restrictions are enforced, though the vulnerability still exists.

🌐 Internet-Facing: LOW - This is primarily a local attack vector requiring local access or social engineering to place malicious DLLs.
🏢 Internal Only: MEDIUM - Internal attackers or malware with local access could exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to place malicious DLLs in directories searched by PCManager. No public exploit code has been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.40.2175 and later

Vendor Advisory: https://iknow.lenovo.com.cn/detail/dc_201470.html

Restart Required: Yes

Instructions:

1. Open Lenovo PCManager. 2. Check for updates in settings. 3. Install version 4.0.40.2175 or later. 4. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict DLL search paths

windows

Use Windows policies to restrict DLL search paths and prevent loading from untrusted directories

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager" -Name "SafeDllSearchMode" -Value 1

Remove vulnerable software

windows

Uninstall Lenovo PCManager if not required for system functionality

appwiz.cpl
Select Lenovo PCManager and click Uninstall

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized DLLs
  • Restrict user permissions to prevent DLL placement in vulnerable directories

🔍 How to Verify

Check if Vulnerable:

Check Lenovo PCManager version in Settings > About. If version is below 4.0.40.2175, the system is vulnerable.

Check Version:

wmic product where name="Lenovo PCManager" get version

Verify Fix Applied:

Confirm Lenovo PCManager version is 4.0.40.2175 or higher after update installation.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual paths
  • Process Monitor logs showing PCManager loading DLLs from user-writable directories

Network Indicators:

  • No specific network indicators as this is local exploitation

SIEM Query:

EventID=7 OR EventID=11 AND ProcessName="PCManager.exe" AND ImageLoaded contains ".dll" AND NOT ImageLoaded contains "C:\Windows\"

🔗 References

📤 Share & Export