CVE-2022-29320

7.8 HIGH

📋 TL;DR

MiniTool Partition Wizard v12.0 has an unquoted service path vulnerability that allows attackers with local access to escalate privileges to SYSTEM level by placing a malicious executable in a specific directory path. This affects all users running the vulnerable version of the software on Windows systems.

💻 Affected Systems

Products:
  • MiniTool Partition Wizard
Versions: Version 12.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system and ability to write to a directory in the service path.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege escalation leading to complete system compromise, persistence installation, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM privileges, enabling installation of malware, disabling security controls, or accessing protected system resources.

🟢

If Mitigated

Limited impact if proper access controls prevent unauthorized users from writing to system directories and if endpoint protection blocks suspicious service creation.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Attackers with initial access to a standard user account can escalate to SYSTEM privileges, enabling significant internal network compromise.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access and ability to create files in a writable directory that appears in the unquoted service path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 12.1 or later

Vendor Advisory: https://www.minitool.com/partition-manager/partition-wizard-home.html

Restart Required: Yes

Instructions:

1. Download and install MiniTool Partition Wizard version 12.1 or later from the official website. 2. Uninstall the vulnerable version 12.0. 3. Restart the system to ensure the updated service is running.

🔧 Temporary Workarounds

Apply proper service path quoting

windows

Manually edit the service configuration to use quotes around the service executable path

sc config "ServiceName" binPath= "\"C:\Program Files\MiniTool Partition Wizard 12.0\pwservice.exe\""

Restrict directory permissions

windows

Set restrictive permissions on directories in the service path to prevent unauthorized file creation

icacls "C:\Program Files\MiniTool" /deny Everyone:(OI)(CI)W

🧯 If You Can't Patch

  • Remove or disable the vulnerable MiniTool Partition Wizard service entirely
  • Implement strict access controls to prevent unauthorized users from writing to system directories

🔍 How to Verify

Check if Vulnerable:

Check if MiniTool Partition Wizard version 12.0 is installed and examine the service path for unquoted spaces using: sc qc "MiniTool Service"

Check Version:

Check program version in Control Panel > Programs and Features or run: wmic product where name="MiniTool Partition Wizard" get version

Verify Fix Applied:

Verify the installed version is 12.1 or later and that the service path is properly quoted with: sc qc "MiniTool Service"

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing service creation/modification events (Event ID 7045)
  • Unexpected service starts from unusual paths
  • File creation in system directories by non-admin users

Network Indicators:

  • No specific network indicators as this is a local exploit

SIEM Query:

EventID=7045 AND (ServiceName="MiniTool*" OR ImagePath="*MiniTool*")

🔗 References

📤 Share & Export