CVE-2023-34641
📋 TL;DR
KioWare for Windows through version 8.33 has an incomplete blacklist filter that allows attackers to bypass blocked dialog box restrictions. This vulnerability enables opening file dialog boxes via window.print() function, which can lead to launching unprivileged command prompts. Organizations using KioWare for Windows up to v8.33 on Windows 10 systems are affected.
💻 Affected Systems
- KioWare for Windows
📦 What is this software?
Kioware by Kioware
⚠️ Risk & Real-World Impact
Worst Case
Attackers could execute arbitrary commands, potentially leading to system compromise, data exfiltration, or lateral movement within the network.
Likely Case
Local privilege escalation allowing attackers to bypass application restrictions and execute unauthorized commands within the KioWare sandbox environment.
If Mitigated
Limited impact with proper application whitelisting and restricted user permissions preventing command execution.
🎯 Exploit Status
Exploitation requires user interaction but uses simple JavaScript calls to trigger the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v8.34 or later
Vendor Advisory: https://www.kioware.com/versionhistory.aspx?pid=15
Restart Required: Yes
Instructions:
1. Download KioWare v8.34 or later from official vendor site. 2. Backup current configuration. 3. Install the updated version. 4. Restart the system. 5. Verify the update in KioWare settings.
🔧 Temporary Workarounds
Disable JavaScript Execution
windowsPrevent JavaScript from executing window.print() calls that trigger the vulnerability
Configure KioWare settings to disable JavaScript execution
Enhanced Application Restrictions
windowsImplement additional application control policies to block command prompt execution
Use Group Policy or third-party application control to block cmd.exe and powershell.exe
🧯 If You Can't Patch
- Implement strict network segmentation to isolate KioWare systems from critical resources
- Deploy enhanced monitoring for command prompt execution attempts and file dialog activities
🔍 How to Verify
Check if Vulnerable:
Check KioWare version in application settings or Control Panel > Programs and Features. Versions 8.33 and earlier are vulnerable.
Check Version:
wmic product where name="KioWare" get version
Verify Fix Applied:
Verify KioWare version is 8.34 or later and test that window.print() no longer opens file dialog boxes in kiosk mode.
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs showing unexpected cmd.exe or powershell.exe execution
- KioWare application logs showing dialog box bypass attempts
Network Indicators:
- Unusual outbound connections from kiosk systems
- Command and control traffic patterns
SIEM Query:
EventID=4688 AND (ProcessName="cmd.exe" OR ProcessName="powershell.exe") AND ParentProcessName contains "KioWare"
🔗 References
- https://github.com/huntergregal/CVE/tree/main/CVE-2023-34641
- https://github.com/huntergregal/CVE/tree/main/TBD-KIOWARE-001
- https://www.kioware.com/versionhistory.aspx?pid=15
- https://github.com/huntergregal/CVE/tree/main/CVE-2023-34641
- https://github.com/huntergregal/CVE/tree/main/TBD-KIOWARE-001
- https://www.kioware.com/versionhistory.aspx?pid=15