CVE-2023-27347

7.8 HIGH

📋 TL;DR

This vulnerability in G DATA Total Security allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM level by exploiting symbolic link handling in the G DATA Backup Service. Attackers must first gain execution capability on the target system. Only installations of G DATA Total Security with the vulnerable Backup Service component are affected.

💻 Affected Systems

Products:
  • G DATA Total Security
Versions: Versions prior to the patch released in response to ZDI-CAN-18749
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the G DATA Backup Service component to be installed and running. The vulnerability is in the service's handling of symbolic links.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and application control are implemented to prevent initial low-privileged code execution.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring initial access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial foothold on a system (via phishing, malware, etc.), they can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute low-privileged code first. Symbolic link manipulation is a well-known technique for privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check G DATA updates for version addressing ZDI-CAN-18749

Vendor Advisory: https://www.gdatasoftware.com/security

Restart Required: Yes

Instructions:

1. Open G DATA Total Security. 2. Navigate to Update Center. 3. Click 'Update now' to download latest virus definitions and program updates. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Disable G DATA Backup Service

windows

Temporarily disable the vulnerable service until patching is possible

sc stop GDBackupService
sc config GDBackupService start= disabled

Remove symbolic link creation privileges

windows

Restrict ability to create symbolic links to prevent exploitation

Set registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\EnableLinkedConnections = 0

🧯 If You Can't Patch

  • Implement strict application control policies to prevent execution of unauthorized low-privileged code
  • Apply principle of least privilege to user accounts and monitor for suspicious privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check G DATA Total Security version and ensure it's updated past the patch release date for ZDI-CAN-18749. Verify GDBackupService is running.

Check Version:

Check G DATA interface under 'About' or run: wmic product where "name like 'G DATA%'" get version

Verify Fix Applied:

Confirm G DATA Total Security is updated to latest version and test symbolic link creation in context of Backup Service functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual symbolic link creation events in Windows security logs
  • GDBackupService process spawning unexpected child processes
  • Privilege escalation attempts from low-privileged accounts

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

EventID=4688 AND ProcessName="GDBackupService.exe" AND ParentProcessName contains non-GD process

🔗 References

📤 Share & Export