CVE-2022-28944

8.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution in multiple EMCO Software products when users trigger software updates. Attackers can exploit the updater's lack of integrity checking to inject malicious code that runs with the application's privileges. Affected users include anyone running vulnerable versions of EMCO's network management and system administration tools.

💻 Affected Systems

Products:
  • MSI Package Builder for Windows
  • Remote Installer for Windows
  • Ping Monitor for Windows
  • Remote Shutdown for Windows
  • WakeOnLan
  • Network Inventory for Windows
  • Network Software Scanner for Windows
  • UnLock IT for Windows
Versions: MSI Package Builder 9.1.4, Remote Installer 6.0.13, Ping Monitor 8.0.18, Remote Shutdown 7.2.2, WakeOnLan 2.0.8, Network Inventory 5.8.22, Network Software Scanner 2.0.8, UnLock IT 6.1.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions are vulnerable by default when updater functionality is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent malware, steal credentials, pivot to other systems, and maintain long-term access to the network.

🟠

Likely Case

Initial foothold leading to privilege escalation, lateral movement within the network, and deployment of ransomware or data exfiltration tools.

🟢

If Mitigated

Limited impact with proper network segmentation and least privilege, potentially only affecting isolated systems without critical data.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to trigger update, but technical complexity is low once triggered. Public advisory includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check EMCO Software website for latest versions

Vendor Advisory: http://emco.com

Restart Required: Yes

Instructions:

1. Visit EMCO Software website 2. Download latest versions of affected products 3. Install updates 4. Restart systems 5. Verify updates applied successfully

🔧 Temporary Workarounds

Disable Auto-Updates

windows

Prevent the vulnerable updater from running by disabling automatic update functionality

Check product settings for update options and disable

Network Segmentation

all

Block updater network traffic at firewall to prevent malicious update payloads

Block outbound connections from EMCO products to update servers

🧯 If You Can't Patch

  • Implement strict network controls to prevent EMCO products from accessing external update servers
  • Run EMCO software with minimal privileges and in isolated environments

🔍 How to Verify

Check if Vulnerable:

Check Help > About in each EMCO product to see if version matches affected list

Check Version:

Check application Help menu or Windows Programs and Features

Verify Fix Applied:

Verify version number is higher than affected versions listed and check update functionality works securely

📡 Detection & Monitoring

Log Indicators:

  • Unusual update activity from EMCO products
  • Process creation from EMCO updater with suspicious parameters
  • Network connections to non-EMCO domains during update process

Network Indicators:

  • HTTP/HTTPS traffic from EMCO products to non-standard update servers
  • Large downloads during update process with unusual file types

SIEM Query:

source="EMCO*" AND (event="update" OR process="updater*") AND dest_ip NOT IN [emco_update_servers]

🔗 References

📤 Share & Export