CVE-2022-50938

8.4 HIGH

📋 TL;DR

CVE-2022-50938 is an unquoted service path vulnerability in CONTPAQi AdminPAQ 14.0.0 that allows attackers to inject malicious code into the service binary path. When exploited, this can lead to arbitrary code execution with LocalSystem privileges during service startup. Organizations using AdminPAQ 14.0.0 on Windows systems are affected.

💻 Affected Systems

Products:
  • CONTPAQi AdminPAQ
Versions: 14.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where the vulnerable AppKeyLicenseServer service is installed and running.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with LocalSystem privileges leading to complete control of the affected system, data theft, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to persistence mechanisms, credential harvesting, and installation of additional malware.

🟢

If Mitigated

Limited impact due to proper access controls, service hardening, and monitoring preventing successful exploitation.

🌐 Internet-Facing: LOW - This vulnerability requires local access to the system, making direct internet exploitation unlikely.
🏢 Internal Only: HIGH - Attackers with initial access to the system (through phishing, compromised accounts, etc.) can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system and ability to write to directories in the service path. Public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.0.1 or later

Vendor Advisory: https://www.contpaqi.com/descargas

Restart Required: Yes

Instructions:

1. Download the latest version from CONTPAQi's website. 2. Install the update following vendor instructions. 3. Restart the system to ensure the service is updated.

🔧 Temporary Workarounds

Add quotes to service path

windows

Manually add quotes around the service binary path in the Windows registry to prevent path interpretation issues.

sc config AppKeyLicenseServer binPath= "C:\Program Files\CONTPAQi\AdminPAQ\AppKeyLicenseServer.exe"

Restrict directory permissions

windows

Remove write permissions for non-administrative users on directories in the service path.

icacls "C:\Program Files\CONTPAQi\AdminPAQ" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized users from writing to directories in the service path.
  • Monitor for suspicious service modifications and unauthorized file creation in system directories.

🔍 How to Verify

Check if Vulnerable:

Check if AppKeyLicenseServer service path is unquoted: sc qc AppKeyLicenseServer | findstr BINARY_PATH_NAME

Check Version:

Check AdminPAQ version through the application interface or installation directory properties

Verify Fix Applied:

Verify service path has quotes: sc qc AppKeyLicenseServer | findstr BINARY_PATH_NAME and check for version 14.0.1+

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing service path modifications (Event ID 7040)
  • Unexpected service restarts or failures
  • Creation of executable files in system directories by non-admin users

Network Indicators:

  • Unusual outbound connections from the AdminPAQ service
  • Network scanning from the affected system

SIEM Query:

EventID=7040 AND ServiceName="AppKeyLicenseServer" OR ProcessCreation WHERE ImagePath contains "AppKeyLicenseServer" AND CommandLine contains unusual parameters

🔗 References

📤 Share & Export