CVE-2022-50930

8.4 HIGH

📋 TL;DR

CVE-2022-50930 is an unquoted service path vulnerability in Emerson PAC Machine Edition 9.80's TrapiServer service that allows local attackers to execute arbitrary code with LocalSystem privileges. This affects systems running the vulnerable software version where attackers have local access. The vulnerability enables privilege escalation from a lower-privileged user account to full system control.

💻 Affected Systems

Products:
  • Emerson PAC Machine Edition
Versions: Version 9.80
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where the TrapiServer service is installed and running. Requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with LocalSystem privileges, enabling installation of persistent malware, credential theft, lateral movement, and data exfiltration.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional tools, and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact if proper access controls prevent local user execution or if service paths are properly secured.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over the network.
🏢 Internal Only: HIGH - Internal attackers with local access can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to the system. Public exploit code is available, making exploitation straightforward for attackers with local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified by vendor

Vendor Advisory: https://www.emerson.com/en-us

Restart Required: Yes

Instructions:

1. Check Emerson's security advisory page for updates. 2. Apply any available patches. 3. Restart affected systems. 4. Verify service paths are properly quoted.

🔧 Temporary Workarounds

Quote Service Path

windows

Manually modify the TrapiServer service configuration to use quoted paths

sc config TrapiServer binPath= "\"C:\Program Files\Emerson\PAC\TrapiServer.exe\""

Restrict Service Permissions

windows

Modify service permissions to prevent unauthorized users from writing to service directories

icacls "C:\Program Files\Emerson\PAC" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to affected systems
  • Monitor for unauthorized service modifications and suspicious file creation in Emerson PAC directories

🔍 How to Verify

Check if Vulnerable:

Check if TrapiServer service path is unquoted: sc qc TrapiServer | findstr BINARY_PATH_NAME

Check Version:

Check Emerson PAC Machine Edition version in Control Panel > Programs and Features

Verify Fix Applied:

Verify service path is quoted and proper permissions are set on Emerson PAC directories

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing service path modifications
  • Unexpected service restarts
  • File creation in Emerson PAC directories

Network Indicators:

  • Unusual outbound connections from systems running Emerson PAC

SIEM Query:

EventID=7045 AND ServiceName="TrapiServer" OR ProcessCreation WHERE ImagePath contains "Emerson\\PAC" AND NOT ImagePath starts with '"'

🔗 References

📤 Share & Export