CVE-2023-27771

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on systems running Wondershare Creative Center v1.0.8. Attackers can exploit the setup executable file to run malicious code with the privileges of the user running the software. All users of the affected version are potentially vulnerable.

💻 Affected Systems

Products:
  • Wondershare Creative Center
Versions: v1.0.8 specifically
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is specifically in the wondershareCC_setup_full10819.exe file. Other versions may be affected but only v1.0.8 is confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running the software, potentially leading to data theft, ransomware deployment, or complete system takeover.

🟠

Likely Case

Local privilege escalation or remote code execution leading to malware installation, data exfiltration, or system disruption.

🟢

If Mitigated

Limited impact if software runs with minimal privileges, network access is restricted, and security controls block malicious payloads.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires some user interaction, it can be exploited remotely if attackers can deliver the malicious file.
🏢 Internal Only: HIGH - Internal users could exploit this for privilege escalation or lateral movement within networks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub issue shows exploitation details. Attackers need to trick users into executing a malicious file or replace the legitimate setup file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

1. Uninstall Wondershare Creative Center v1.0.8 completely. 2. Check Wondershare website for updated version. 3. If no update available, consider alternative software.

🔧 Temporary Workarounds

Remove vulnerable executable

windows

Delete or quarantine the vulnerable wondershareCC_setup_full10819.exe file

del "C:\path\to\wondershareCC_setup_full10819.exe"
Remove-Item -Path "C:\path\to\wondershareCC_setup_full10819.exe" -Force

Restrict file execution

windows

Apply application control policies to prevent execution of the vulnerable file

🧯 If You Can't Patch

  • Run software with minimal user privileges (not as administrator)
  • Implement network segmentation to limit potential lateral movement

🔍 How to Verify

Check if Vulnerable:

Check if wondershareCC_setup_full10819.exe file exists on system and verify file version is 1.0.8

Check Version:

Right-click wondershareCC_setup_full10819.exe → Properties → Details tab, or use: wmic datafile where name='C:\\path\\to\\wondershareCC_setup_full10819.exe' get version

Verify Fix Applied:

Confirm vulnerable file is removed and Creative Center is either uninstalled or updated to newer version

📡 Detection & Monitoring

Log Indicators:

  • Execution of wondershareCC_setup_full10819.exe with unusual parameters
  • Process creation from the setup file with suspicious child processes

Network Indicators:

  • Outbound connections from Creative Center process to unknown IPs
  • DNS requests for suspicious domains after setup execution

SIEM Query:

Process Creation where Image contains 'wondershareCC_setup_full10819.exe' AND CommandLine contains suspicious patterns

🔗 References

📤 Share & Export