CVE-2023-27761

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on systems running vulnerable versions of Wondershare UniConverter. Attackers can exploit this by tricking users into running a malicious installer file, potentially gaining full control of the affected system. Users of Wondershare UniConverter version 14.0.0 are affected.

💻 Affected Systems

Products:
  • Wondershare UniConverter
Versions: 14.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the uniconverter14_64bit_setup_full14204.exe installer file. The vulnerability is in the installer itself, not the installed application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal data, create backdoors, or use the system for further attacks.

🟠

Likely Case

Attackers gain initial access to the system, potentially leading to ransomware deployment, credential theft, or lateral movement within the network.

🟢

If Mitigated

Limited impact if proper application whitelisting, user privilege restrictions, and network segmentation are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction to run the malicious installer file. The vulnerability is in the installer's command execution mechanism.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.0.1 or later

Vendor Advisory: https://www.wondershare.com/

Restart Required: No

Instructions:

1. Download the latest version from official Wondershare website. 2. Uninstall the vulnerable version. 3. Install the updated version. 4. Verify the installation is version 14.0.1 or higher.

🔧 Temporary Workarounds

Application Whitelisting

windows

Prevent execution of unauthorized installer files using application control policies.

Configure Windows AppLocker or similar application whitelisting solution

User Education

all

Train users to only download software from official sources and verify file integrity.

🧯 If You Can't Patch

  • Remove vulnerable version and use alternative software until patch can be applied
  • Implement network segmentation to isolate systems running vulnerable software

🔍 How to Verify

Check if Vulnerable:

Check if Wondershare UniConverter version 14.0.0 is installed. Look for the specific installer file uniconverter14_64bit_setup_full14204.exe in download locations.

Check Version:

Check in Wondershare UniConverter: Help > About, or look at the installed programs list in Windows Control Panel.

Verify Fix Applied:

Verify the installed version is 14.0.1 or higher. Check that the vulnerable installer file is not present on the system.

📡 Detection & Monitoring

Log Indicators:

  • Execution of uniconverter14_64bit_setup_full14204.exe from unusual locations
  • Process creation events with suspicious command-line arguments

Network Indicators:

  • Downloads of the vulnerable installer from non-official sources
  • Outbound connections from UniConverter installer to suspicious IPs

SIEM Query:

Process Creation where Image contains 'uniconverter14_64bit_setup_full14204.exe' OR CommandLine contains suspicious patterns

🔗 References

📤 Share & Export