CVE-2022-31464
📋 TL;DR
This vulnerability in Adaware Protect v1.2.439.4251 allows local attackers to escalate privileges by modifying the service binary path due to insecure permissions. Attackers can replace the legitimate service executable with malicious code that runs with SYSTEM privileges. This affects all users running the vulnerable version of Adaware Protect on Windows systems.
💻 Affected Systems
- Adaware Protect
📦 What is this software?
Protect by Adaware
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where an attacker gains SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement, and disabling of security controls.
Likely Case
Local privilege escalation allowing attackers to bypass security restrictions, install additional malware, or access protected system resources.
If Mitigated
Limited impact if proper access controls and monitoring are in place, though the vulnerability still provides a foothold for attackers.
🎯 Exploit Status
Exploitation requires local access but is straightforward once access is obtained. The Medium article provides detailed exploitation methodology.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check with vendor for updated version
Vendor Advisory: https://www.adaware.com/
Restart Required: Yes
Instructions:
1. Visit https://www.adaware.com/
2. Download latest version of Adaware Protect
3. Uninstall current version
4. Install updated version
5. Restart system
🔧 Temporary Workarounds
Restrict Service Permissions
windowsModify service permissions to prevent unauthorized users from changing the binary path
sc.exe sdset AdawareProtectService D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)
Remove Vulnerable Software
windowsUninstall Adaware Protect if not essential
appwiz.cpl
Select Adaware Protect and click Uninstall
🧯 If You Can't Patch
- Implement strict access controls to limit local user privileges on affected systems
- Monitor for unauthorized service modifications and privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check installed version of Adaware Protect via Programs and Features or using command: wmic product where name='Adaware Protect' get version
Check Version:
wmic product where name='Adaware Protect' get version
Verify Fix Applied:
Verify service permissions using: sc.exe sdshow AdawareProtectService and ensure only authorized users have SERVICE_CHANGE_CONFIG permission
📡 Detection & Monitoring
Log Indicators:
- Windows Event ID 7045: Service installed
- Windows Event ID 4697: Service creation
- Unexpected modifications to Adaware Protect service configuration
Network Indicators:
- None - this is a local privilege escalation vulnerability
SIEM Query:
EventID=7045 OR EventID=4697 | where ServiceName contains 'Adaware'