CVE-2022-50931
📋 TL;DR
TeamSpeak 3.5.6 has insecure file permissions that allow local attackers to replace executable files with malicious binaries. This enables privilege escalation where attackers can replace system executables to potentially gain SYSTEM or Administrator-level access. Only users running TeamSpeak 3.5.6 on Windows systems are affected.
💻 Affected Systems
- TeamSpeak 3 Client
📦 What is this software?
Teamspeak by Teamspeak
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains SYSTEM privileges, enabling complete system compromise, data theft, persistence, and lateral movement within the network.
Likely Case
Local attacker gains Administrator privileges, allowing installation of malware, credential theft, and privilege escalation on the affected system.
If Mitigated
Attack fails due to proper file permissions, user account restrictions, or security software preventing binary replacement.
🎯 Exploit Status
Exploit requires local access to the system. Public exploit code is available on Exploit-DB (ID 50743).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.5.7 and later
Vendor Advisory: https://www.teamspeak.com
Restart Required: Yes
Instructions:
1. Download TeamSpeak 3.5.7 or later from teamspeak.com. 2. Uninstall TeamSpeak 3.5.6. 3. Install the updated version. 4. Restart the system.
🔧 Temporary Workarounds
Restrict File Permissions
windowsManually set proper file permissions on TeamSpeak installation directory to prevent unauthorized file modifications.
icacls "C:\Program Files\TeamSpeak 3 Client\*" /inheritance:r /grant:r "%USERNAME%":(R,W) /grant:r "SYSTEM":(F) /grant:r "Administrators":(F)
Run as Standard User
windowsRun TeamSpeak with standard user privileges instead of Administrator privileges to limit potential damage.
🧯 If You Can't Patch
- Remove TeamSpeak 3.5.6 from all systems until patched version can be installed.
- Implement strict access controls and monitoring on systems with TeamSpeak 3.5.6 installed.
🔍 How to Verify
Check if Vulnerable:
Check TeamSpeak version in Help > About. If version is 3.5.6, system is vulnerable.
Check Version:
Check Help > About in TeamSpeak client or examine installed programs in Windows Control Panel.
Verify Fix Applied:
Verify TeamSpeak version is 3.5.7 or later in Help > About. Check file permissions on TeamSpeak executables.
📡 Detection & Monitoring
Log Indicators:
- Windows Event Log entries showing file permission changes in TeamSpeak directory
- Unexpected file modifications to ts3client_win32.exe or other TeamSpeak executables
Network Indicators:
- Unusual network connections from TeamSpeak process after exploitation
SIEM Query:
EventID=4663 AND ObjectName LIKE '%TeamSpeak%' AND Accesses LIKE '%WRITE_DAC%' OR Accesses LIKE '%WRITE_OWNER%'