CVE-2022-36415

7.8 HIGH

📋 TL;DR

A DLL hijacking vulnerability in Scooter Beyond Compare's uninstaller allows local attackers to execute arbitrary code with SYSTEM privileges. When the uninstaller runs, it loads DLLs from the Windows Temp folder, enabling privilege escalation if malicious DLLs are placed there. This affects standard users who can write to C:\Windows\Temp\ and trigger the uninstaller.

💻 Affected Systems

Products:
  • Scooter Beyond Compare
Versions: 1.8a through 4.4.2 (before 4.4.3)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations performed via the EXE installer (not MSI). The vulnerability exists in the uninstaller component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM-level compromise of the Windows system, allowing complete control, data theft, persistence mechanisms, and lateral movement.

🟠

Likely Case

Local privilege escalation from standard user to SYSTEM, enabling installation of malware, disabling security controls, or accessing protected resources.

🟢

If Mitigated

Limited impact if proper access controls prevent standard users from writing to C:\Windows\Temp\ or if the uninstaller is never executed.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: MEDIUM - Requires an attacker to have local access as a standard user and ability to write to the Temp folder, which is common in many environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access as a standard user with write permissions to C:\Windows\Temp\ and ability to execute the uninstaller. DLL hijacking techniques are well-documented and relatively simple to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.4.3 and later

Vendor Advisory: https://www.scootersoftware.com/support.php?zz=kb_security_2022-02

Restart Required: No

Instructions:

1. Download Beyond Compare version 4.4.3 or later from the official website. 2. Run the installer to upgrade. 3. The update will automatically replace the vulnerable uninstaller component.

🔧 Temporary Workarounds

Restrict write access to Windows Temp folder

windows

Modify permissions on C:\Windows\Temp\ to prevent standard users from writing files

icacls C:\Windows\Temp\ /deny Users:(OI)(CI)W

Remove vulnerable uninstaller

windows

Delete or rename the vulnerable uninstaller executable to prevent execution

del "C:\Program Files\Beyond Compare 4\unins000.exe"
ren "C:\Program Files\Beyond Compare 4\unins000.exe" unins000.exe.bak

🧯 If You Can't Patch

  • Implement strict access controls on C:\Windows\Temp\ to prevent standard users from writing files
  • Monitor for suspicious DLL files in C:\Windows\Temp\ and for execution of the Beyond Compare uninstaller

🔍 How to Verify

Check if Vulnerable:

Check Beyond Compare version: if installed via EXE installer and version is between 1.8a and 4.4.2 inclusive, the system is vulnerable.

Check Version:

Open Beyond Compare and go to Help → About, or check the file properties of BCompare.exe

Verify Fix Applied:

Verify Beyond Compare version is 4.4.3 or later. Check that the uninstaller file (unins000.exe) has been updated.

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for unins000.exe with SYSTEM privileges
  • File creation events for DLL files in C:\Windows\Temp\ by standard users

Network Indicators:

  • No network indicators - this is a local privilege escalation vulnerability

SIEM Query:

Process Creation: (Image='*\unins000.exe' AND IntegrityLevel='System') OR File Creation: (TargetFilename='C:\Windows\Temp\*.dll' AND SubjectUserName NOT IN ('SYSTEM', 'LOCAL SERVICE', 'NETWORK SERVICE'))

🔗 References

📤 Share & Export