CVE-2023-35897

8.4 HIGH

📋 TL;DR

This CVE describes a DLL hijacking vulnerability in IBM Spectrum Protect Client and IBM Storage Protect for Virtual Environments. A local authenticated user could execute arbitrary code with system privileges by placing a malicious DLL in a location where the application searches for it. This affects versions 8.1.0.0 through 8.1.19.0.

💻 Affected Systems

Products:
  • IBM Spectrum Protect Client
  • IBM Storage Protect for Virtual Environments
Versions: 8.1.0.0 through 8.1.19.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to the system where the software is installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to SYSTEM/root level, allowing complete system compromise, data theft, and persistence establishment.

🟠

Likely Case

Local authenticated user gains elevated privileges to install malware, access sensitive data, or disrupt backup operations.

🟢

If Mitigated

Limited impact due to proper access controls, least privilege principles, and timely patching.

🌐 Internet-Facing: LOW - This requires local access to the system, not remotely exploitable.
🏢 Internal Only: HIGH - Local authenticated users can exploit this, making internal systems with vulnerable software at significant risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking vulnerabilities are typically straightforward to exploit once the vulnerable DLL search path is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.1.20.0 and later

Vendor Advisory: https://www.ibm.com/support/pages/node/7037299

Restart Required: Yes

Instructions:

1. Download IBM Spectrum Protect Client or IBM Storage Protect for Virtual Environments version 8.1.20.0 or later from IBM Fix Central. 2. Install the update following IBM's installation documentation. 3. Restart the system to ensure all components are updated.

🔧 Temporary Workarounds

Restrict DLL search paths

all

Configure the application to use secure DLL search paths or set appropriate permissions on directories.

On Windows: Use Group Policy to restrict DLL search order or set appropriate ACLs on vulnerable directories.
On Linux: Use chmod to restrict write permissions on directories in the library search path.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to systems running vulnerable software.
  • Monitor for suspicious DLL loading events using security tools and audit logs.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of IBM Spectrum Protect Client or IBM Storage Protect for Virtual Environments. If version is between 8.1.0.0 and 8.1.19.0 inclusive, the system is vulnerable.

Check Version:

On Windows: Check via Programs and Features or run 'dsmc' command with version flag. On Linux: Check package version using rpm/dpkg or run 'dsmc' command.

Verify Fix Applied:

Verify the installed version is 8.1.20.0 or later and that no unauthorized DLL files exist in application directories.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loading events in application logs
  • Security logs showing privilege escalation attempts

Network Indicators:

  • None - this is a local exploit

SIEM Query:

Search for events where IBM Spectrum Protect processes load DLLs from unexpected locations or user directories.

🔗 References

📤 Share & Export