CVE-2023-22818

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers with local access to execute arbitrary code by placing malicious DLLs in the same folder as the SanDisk Security Installer. When the installer runs, it loads the malicious DLL instead of legitimate ones, enabling code execution with installer privileges. This affects Windows users running vulnerable versions of the SanDisk Security Installer.

💻 Affected Systems

Products:
  • SanDisk Security Installer for Windows
Versions: Versions prior to 1.0.0.25
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to place malicious DLL in same directory as installer executable and convince user to run the installer from that location.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining persistence and administrative privileges on the host, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation where an attacker with limited access gains higher privileges, installs malware, or establishes persistence on the compromised system.

🟢

If Mitigated

Limited impact with proper access controls preventing unauthorized local execution and monitoring detecting suspicious DLL loading behavior.

🌐 Internet-Facing: LOW - This requires local access to the system and cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Attackers with local access (including malicious insiders or compromised accounts) can exploit this to escalate privileges and establish persistence.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL search order hijacking is a well-known technique requiring minimal technical skill. Exploitation requires local access and social engineering to execute installer from malicious location.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.0.25

Vendor Advisory: https://www.westerndigital.com/support/product-security/wdc-23013-sandisk-security-installer-for-windows-1-0-0-25

Restart Required: No

Instructions:

1. Download version 1.0.0.25 or later from Western Digital's official website. 2. Uninstall previous versions. 3. Install the updated version. 4. Verify installation by checking version number.

🔧 Temporary Workarounds

Restrict installer execution locations

windows

Limit where the SanDisk Security Installer can be executed from to prevent loading malicious DLLs from untrusted directories.

Use Group Policy or application whitelisting to restrict execution to trusted directories only

Remove unnecessary installer files

windows

Delete the SanDisk Security Installer executable if not needed to eliminate the attack vector entirely.

Remove SanDisk Security Installer executable files from systems

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local execution of installers
  • Monitor for suspicious DLL loading behavior and installer execution from unusual locations

🔍 How to Verify

Check if Vulnerable:

Check the installed version of SanDisk Security Installer. If version is earlier than 1.0.0.25, the system is vulnerable.

Check Version:

Check program properties in Windows or run: wmic product where name='SanDisk Security Installer' get version

Verify Fix Applied:

Verify the installed version is 1.0.0.25 or later by checking the application properties or running the installer with version flag.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing SanDisk Security Installer execution from unusual directories
  • Security logs showing DLL loading from non-standard paths

Network Indicators:

  • No network indicators as this is a local exploit

SIEM Query:

EventID=4688 AND ProcessName LIKE '%SanDisk%' AND CommandLine CONTAINS unusual directory paths

🔗 References

📤 Share & Export