CVE-2023-29059
📋 TL;DR
CVE-2023-29059 involves malicious code embedded in 3CX DesktopApp versions, enabling supply chain attacks. This allows attackers to execute arbitrary code on affected systems through DLL sideloading. Organizations using the compromised 3CX DesktopApp versions are affected.
💻 Affected Systems
- 3CX DesktopApp
📦 What is this software?
3cx by 3cx
3cx by 3cx
3cx by 3cx
3cx by 3cx
3cx by 3cx
3cx by 3cx
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to data exfiltration, ransomware deployment, and lateral movement across the network.
Likely Case
Initial access leading to information stealing, credential harvesting, and installation of additional malware.
If Mitigated
Limited impact with proper endpoint protection detecting malicious behavior and network segmentation containing lateral movement.
🎯 Exploit Status
Actively exploited in the wild via DLL sideloading; exploitation requires user interaction to launch the compromised application.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 18.12.422 or later
Vendor Advisory: https://www.3cx.com/blog/news/desktopapp-security-alert/
Restart Required: Yes
Instructions:
1. Uninstall affected 3CX DesktopApp versions. 2. Download and install version 18.12.422 or later from the official 3CX website. 3. Restart the system.
🔧 Temporary Workarounds
Application Removal
windowsUninstall affected 3CX DesktopApp versions to eliminate the vulnerability.
Control Panel > Programs > Uninstall a program > Select 3CX DesktopApp > Uninstall
Endpoint Protection Rules
allConfigure endpoint security to block execution of malicious DLLs associated with 3CX DesktopApp.
🧯 If You Can't Patch
- Isolate affected systems from critical network segments to limit lateral movement.
- Implement application allowlisting to prevent execution of unauthorized binaries.
🔍 How to Verify
Check if Vulnerable:
Check the installed version of 3CX DesktopApp via the application's About section or system installed programs list.
Check Version:
On Windows: Check in 'Apps & features' or run 'wmic product where name="3CX DesktopApp" get version'. On macOS: Check in Applications folder or use terminal commands specific to the app.
Verify Fix Applied:
Confirm the installed version is 18.12.422 or later and verify no suspicious DLLs are present in the application directory.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from 3CX DesktopApp directory
- DLL loading events from non-standard paths
Network Indicators:
- Outbound connections to suspicious IPs or domains from 3CX processes
- Unusual DNS queries
SIEM Query:
Process creation where parent process contains '3CX' AND (command line contains 'dll' OR image path contains suspicious DLL names)
🔗 References
- https://cwe.mitre.org/data/definitions/506.html
- https://news.sophos.com/en-us/2023/03/29/3cx-dll-sideloading-attack/
- https://www.3cx.com/blog/news/desktopapp-security-alert/
- https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/
- https://www.fortinet.com/blog/threat-research/3cx-desktop-app-compromised
- https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats
- https://cwe.mitre.org/data/definitions/506.html
- https://news.sophos.com/en-us/2023/03/29/3cx-dll-sideloading-attack/
- https://www.3cx.com/blog/news/desktopapp-security-alert/
- https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/
- https://www.fortinet.com/blog/threat-research/3cx-desktop-app-compromised
- https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats