CVE-2022-24644

8.8 HIGH

📋 TL;DR

CVE-2022-24644 is a remote code execution vulnerability in ZZ Inc. KeyMouse software that allows attackers to execute arbitrary code during unauthenticated updates. The vulnerability affects KeyMouse Windows versions 3.08 and prior. Users who trigger updates on affected installations are vulnerable to exploitation.

💻 Affected Systems

Products:
  • ZZ Inc. KeyMouse
Versions: 3.08 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability is triggered during the update process.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the affected system, installing malware, stealing credentials, and pivoting to other systems.

🟠

Likely Case

Attacker executes malicious code with system-level privileges, potentially installing ransomware, backdoors, or credential stealers on the compromised system.

🟢

If Mitigated

If proper network segmentation and update controls are in place, impact is limited to the isolated system with no lateral movement.

🌐 Internet-Facing: MEDIUM - Requires user to trigger update, but could be combined with social engineering or other attack vectors.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they can trigger updates on vulnerable systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the user to trigger an update, which could be accomplished through social engineering or other means. Public proof-of-concept code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.09 or later

Vendor Advisory: http://keymouse.com

Restart Required: Yes

Instructions:

1. Download latest version from official KeyMouse website. 2. Uninstall current version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Disable Automatic Updates

windows

Prevent KeyMouse from automatically checking for or installing updates

Check KeyMouse settings for update options and disable automatic updates

Network Block Update Servers

all

Block network access to KeyMouse update servers

Add firewall rules to block outbound connections to KeyMouse update domains/IPs

🧯 If You Can't Patch

  • Remove KeyMouse software from critical systems
  • Implement strict network segmentation to isolate systems running vulnerable KeyMouse versions

🔍 How to Verify

Check if Vulnerable:

Check KeyMouse version in About dialog or installed programs list

Check Version:

Check program version in Control Panel > Programs and Features or via KeyMouse About menu

Verify Fix Applied:

Verify KeyMouse version is 3.09 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution during KeyMouse update
  • Network connections to suspicious domains during update process

Network Indicators:

  • Outbound connections to non-standard update servers
  • Unusual download patterns during KeyMouse update

SIEM Query:

Process creation where parent process contains 'KeyMouse' AND command line contains unusual parameters OR Network connection where process contains 'KeyMouse' AND destination IP not in approved update servers list

🔗 References

📤 Share & Export