CVE-2023-34394

7.8 HIGH

📋 TL;DR

Keysight Geolocation Server v2.4.2 and earlier contain a path traversal vulnerability that allows attackers to upload malicious files or delete arbitrary files/directories with SYSTEM privileges. This can lead to local privilege escalation or denial-of-service conditions. Organizations using affected versions of this geolocation server software are at risk.

💻 Affected Systems

Products:
  • Keysight Geolocation Server
Versions: v2.4.2 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation. SYSTEM privilege exploitation indicates service runs with high privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via privilege escalation to SYSTEM, allowing installation of persistent malware, data destruction, or disabling of critical services.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive data, system configuration changes, or service disruption through file deletion.

🟢

If Mitigated

Limited impact with proper network segmentation, file integrity monitoring, and least privilege principles in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity once access is obtained. Requires some level of access to the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.4.3 or later

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-02

Restart Required: Yes

Instructions:

1. Download latest version from Keysight support portal
2. Backup current configuration and data
3. Install updated version following vendor instructions
4. Restart the Geolocation Server service
5. Verify functionality

🔧 Temporary Workarounds

Restrict File System Access

windows

Apply strict file system permissions to limit what the Geolocation Server service can access

icacls "C:\Program Files\Keysight\Geolocation Server" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" /grant:r "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(DE,DC)"

Network Segmentation

all

Isolate Geolocation Server from other critical systems and restrict access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable system
  • Deploy file integrity monitoring to detect unauthorized file changes or deletions

🔍 How to Verify

Check if Vulnerable:

Check installed version via Control Panel > Programs and Features or by examining the application directory

Check Version:

wmic product where name="Keysight Geolocation Server" get version

Verify Fix Applied:

Verify version is v2.4.3 or later and test file upload/delete functionality with path traversal attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to Geolocation Server
  • File deletion events in system logs
  • Failed path traversal attempts in application logs

Network Indicators:

  • Unusual outbound connections from Geolocation Server
  • File transfer patterns to/from the server

SIEM Query:

source="windows_security" EventCode=4663 ObjectName="*Geolocation*" OR source="application" message="*upload*" OR "*delete*"

🔗 References

📤 Share & Export