CVE-2022-32972

7.8 HIGH

📋 TL;DR

CVE-2022-32972 is a DLL injection vulnerability in Infoblox BloxOne Endpoint for Windows that allows local attackers to execute arbitrary code with elevated privileges. This affects Windows systems running vulnerable versions of the BloxOne Endpoint software. Attackers can exploit this to gain SYSTEM-level access on compromised machines.

💻 Affected Systems

Products:
  • Infoblox BloxOne Endpoint
Versions: Through version 2.2.7
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of BloxOne Endpoint. Linux and other platforms are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement, and disabling of security controls.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM, allowing attackers to bypass security restrictions and maintain persistence on the system.

🟢

If Mitigated

Limited impact if proper endpoint protection and least privilege principles are enforced, though local privilege escalation remains possible.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Attackers with initial access to a Windows endpoint can escalate privileges to compromise the entire system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. DLL injection techniques are well-documented and relatively easy to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.2.8 and later

Vendor Advisory: https://community.infoblox.com/t5/trending-kb-articles/cve-2022-32972-infoblox-bloxone-endpoint-for-windows-local/ba-p/24912

Restart Required: Yes

Instructions:

1. Download BloxOne Endpoint version 2.2.8 or later from Infoblox support portal. 2. Run the installer with administrative privileges. 3. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict DLL loading

windows

Configure Windows to restrict DLL loading from untrusted locations

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v CWDIllegalInDllSearch /t REG_DWORD /d 0x1 /f

Remove unnecessary privileges

windows

Run BloxOne Endpoint service with reduced privileges

sc config "BloxOne Endpoint" obj= "NT AUTHORITY\LocalService"

🧯 If You Can't Patch

  • Implement strict application whitelisting to prevent unauthorized DLL loading
  • Enforce least privilege principles and remove local administrator rights from standard users

🔍 How to Verify

Check if Vulnerable:

Check BloxOne Endpoint version in Control Panel > Programs and Features. Versions 2.2.7 and earlier are vulnerable.

Check Version:

wmic product where "name like 'Infoblox BloxOne Endpoint%'" get version

Verify Fix Applied:

Verify version is 2.2.8 or later in Control Panel > Programs and Features, and check that the service is running properly.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Process creation events with parent process of BloxOne Endpoint service

Network Indicators:

  • Unusual outbound connections from BloxOne Endpoint process

SIEM Query:

process_name:"bloxone*" AND (file_path:*\temp\* OR file_path:*\users\*) AND action:"create"

🔗 References

📤 Share & Export