CVE-2022-50918

8.4 HIGH

📋 TL;DR

CVE-2022-50918 is an unquoted service path vulnerability in VIVE Runtime Service that allows local attackers to execute arbitrary code with SYSTEM privileges. Attackers can place malicious executables in specific system directories to gain elevated access when the service starts. This affects systems running VIVE Runtime Service 1.0.0.4.

💻 Affected Systems

Products:
  • VIVE Runtime Service
Versions: 1.0.0.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows systems where VIVE Runtime Service is installed with default configuration. Requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with LocalSystem privileges, allowing attackers to install persistent malware, steal credentials, and control the entire system.

🟠

Likely Case

Local privilege escalation leading to unauthorized administrative access, data theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper access controls prevent local users from writing to system directories and service paths are properly quoted.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised user accounts can exploit this to gain SYSTEM privileges and move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to write files to system directories. Public exploit code is available on Exploit-DB (ID 50824).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest VIVE Runtime Service version

Vendor Advisory: https://developer.vive.com/resources/downloads/

Restart Required: Yes

Instructions:

1. Download latest VIVE Runtime Service from official Vive website. 2. Uninstall current version. 3. Install updated version. 4. Restart system to ensure service updates take effect.

🔧 Temporary Workarounds

Quote Service Path

windows

Manually modify the service configuration to use quoted paths for the binary executable.

sc config ViveAgentService binPath= "\"C:\Program Files\VIVE\VIVE Runtime Service\ViveAgentService.exe\""

Restrict Directory Permissions

windows

Set strict permissions on system directories to prevent unauthorized file creation.

icacls "C:\Program Files\VIVE" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(W)"

🧯 If You Can't Patch

  • Remove unnecessary local user accounts and restrict local access to systems running VIVE Runtime Service.
  • Implement application whitelisting to prevent execution of unauthorized binaries from system directories.

🔍 How to Verify

Check if Vulnerable:

Check if VIVE Runtime Service 1.0.0.4 is installed and if the service path is unquoted using: sc qc ViveAgentService

Check Version:

Check Programs and Features or run: wmic product where name="VIVE Runtime Service" get version

Verify Fix Applied:

Verify service path is quoted and version is updated: sc qc ViveAgentService and check installed programs list.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unauthorized service modifications
  • Security logs with unexpected file creation in system directories
  • Process creation events for ViveAgentService.exe from unexpected paths

Network Indicators:

  • Unusual outbound connections from system-level processes
  • Lateral movement attempts from compromised systems

SIEM Query:

EventID=4688 AND ProcessName="ViveAgentService.exe" AND NOT (ImagePath="*\"C:\Program Files\VIVE\VIVE Runtime Service\ViveAgentService.exe\"*")

🔗 References

📤 Share & Export