CVE-2022-23410
📋 TL;DR
CVE-2022-23410 is a DLL hijacking vulnerability in AXIS IP Utility that allows attackers to execute arbitrary code with elevated privileges. It affects users running vulnerable versions of AXIS IP Utility on Windows systems. Attackers can exploit this by placing malicious DLLs in the same directory as IPUtility.exe.
💻 Affected Systems
- AXIS IP Utility
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with SYSTEM/administrator privileges, enabling complete control over affected systems, data theft, and lateral movement.
Likely Case
Local privilege escalation leading to unauthorized administrative access on the compromised system.
If Mitigated
Limited impact with proper access controls preventing unauthorized file placement in application directories.
🎯 Exploit Status
Requires ability to place malicious DLL in application directory before execution.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.18.0 and later
Vendor Advisory: https://www.axis.com/files/tech_notes/CVE-2022-23410.pdf
Restart Required: Yes
Instructions:
1. Download AXIS IP Utility 4.18.0 or later from official AXIS website. 2. Uninstall previous version. 3. Install new version. 4. Restart system.
🔧 Temporary Workarounds
Restrict directory permissions
windowsSet strict permissions on IPUtility.exe directory to prevent unauthorized file creation.
icacls "C:\Program Files\AXIS\IP Utility" /deny Everyone:(OI)(CI)(W)
Use application whitelisting
windowsImplement application control to prevent execution of unauthorized DLLs.
🧯 If You Can't Patch
- Remove or restrict execute permissions for non-admin users on IPUtility.exe
- Monitor for suspicious DLL files in AXIS IP Utility directories
🔍 How to Verify
Check if Vulnerable:
Check AXIS IP Utility version in Help > About. If version is below 4.18.0, system is vulnerable.
Check Version:
Not applicable - check via GUI Help > About menu
Verify Fix Applied:
Verify installed version is 4.18.0 or higher in Help > About menu.
📡 Detection & Monitoring
Log Indicators:
- Unusual DLL loading events from AXIS IP Utility directories
- Process creation events for IPUtility.exe with unexpected parent processes
Network Indicators:
- Unusual outbound connections from IPUtility.exe process
SIEM Query:
Process Name="IPUtility.exe" AND (Image Loaded="*.dll" FROM "C:\Users\*\*" OR Image Loaded="*.dll" FROM "C:\Temp\*")