CVE-2023-34641

7.8 HIGH

📋 TL;DR

KioWare for Windows through version 8.33 has an incomplete blacklist filter that allows attackers to bypass blocked dialog box restrictions. This vulnerability enables opening file dialog boxes via window.print() function, which can lead to launching unprivileged command prompts. Organizations using KioWare for Windows up to v8.33 on Windows 10 systems are affected.

💻 Affected Systems

Products:
  • KioWare for Windows
Versions: through v8.33
Operating Systems: Windows 10
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the dialog box blacklist filtering mechanism in kiosk mode configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary commands, potentially leading to system compromise, data exfiltration, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass application restrictions and execute unauthorized commands within the KioWare sandbox environment.

🟢

If Mitigated

Limited impact with proper application whitelisting and restricted user permissions preventing command execution.

🌐 Internet-Facing: MEDIUM - Requires user interaction with malicious content but could affect kiosk systems exposed to public users.
🏢 Internal Only: HIGH - Internal users could exploit this to bypass application restrictions and gain unauthorized system access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction but uses simple JavaScript calls to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v8.34 or later

Vendor Advisory: https://www.kioware.com/versionhistory.aspx?pid=15

Restart Required: Yes

Instructions:

1. Download KioWare v8.34 or later from official vendor site. 2. Backup current configuration. 3. Install the updated version. 4. Restart the system. 5. Verify the update in KioWare settings.

🔧 Temporary Workarounds

Disable JavaScript Execution

windows

Prevent JavaScript from executing window.print() calls that trigger the vulnerability

Configure KioWare settings to disable JavaScript execution

Enhanced Application Restrictions

windows

Implement additional application control policies to block command prompt execution

Use Group Policy or third-party application control to block cmd.exe and powershell.exe

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate KioWare systems from critical resources
  • Deploy enhanced monitoring for command prompt execution attempts and file dialog activities

🔍 How to Verify

Check if Vulnerable:

Check KioWare version in application settings or Control Panel > Programs and Features. Versions 8.33 and earlier are vulnerable.

Check Version:

wmic product where name="KioWare" get version

Verify Fix Applied:

Verify KioWare version is 8.34 or later and test that window.print() no longer opens file dialog boxes in kiosk mode.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected cmd.exe or powershell.exe execution
  • KioWare application logs showing dialog box bypass attempts

Network Indicators:

  • Unusual outbound connections from kiosk systems
  • Command and control traffic patterns

SIEM Query:

EventID=4688 AND (ProcessName="cmd.exe" OR ProcessName="powershell.exe") AND ParentProcessName contains "KioWare"

🔗 References

📤 Share & Export