CVE-2023-36657

9.8 CRITICAL

📋 TL;DR

This vulnerability in OPSWAT MetaDefender KIOSK allows attackers to abuse built-in Windows features like desktop shortcuts and narrator to escalate privileges from a standard user to SYSTEM/administrator level. It affects OPSWAT MetaDefender KIOSK installations on Windows systems. This is a critical privilege escalation flaw with a CVSS score of 9.8.

💻 Affected Systems

Products:
  • OPSWAT MetaDefender KIOSK
Versions: 4.6.1.9996 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows-based kiosk deployments where the MetaDefender KIOSK software is installed. The vulnerability leverages built-in Windows accessibility features.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains SYSTEM privileges, enabling installation of malware, data theft, lateral movement, and persistence mechanisms.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install unauthorized software, and access sensitive data on the kiosk system.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and monitoring are implemented, though local system compromise would still occur.

🌐 Internet-Facing: MEDIUM - While primarily a local attack, internet-facing kiosks could be targeted if attackers gain initial access through other means.
🏢 Internal Only: HIGH - This is primarily an internal/local attack vector that can be exploited by anyone with physical or remote access to the kiosk interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the kiosk interface but uses simple Windows feature abuse techniques. The CWE-269 (Improper Privilege Management) classification suggests straightforward privilege escalation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 4.6.1.9996

Vendor Advisory: https://docs.opswat.com/mdkiosk/release-notes/cve-2023-36657

Restart Required: Yes

Instructions:

1. Update to the latest version of OPSWAT MetaDefender KIOSK. 2. Follow vendor update procedures from the release notes. 3. Restart the kiosk system after patching. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable Windows Accessibility Features

windows

Temporarily disable or restrict Windows narrator and shortcut features that can be abused for privilege escalation.

gpedit.msc to configure Group Policy for accessibility features
regedit to modify registry settings for narrator and shortcut handlers

Enhanced Kiosk Lockdown

windows

Implement stricter kiosk lockdown policies to prevent access to Windows features and system utilities.

Configure Assigned Access or Kiosk Mode policies
Use AppLocker to restrict executable access

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized access to kiosk systems.
  • Deploy network segmentation to isolate kiosk systems from critical network resources.

🔍 How to Verify

Check if Vulnerable:

Check the MetaDefender KIOSK version in the application interface or system information. Versions 4.6.1.9996 and earlier are vulnerable.

Check Version:

Check the application's About section or use Windows system information tools to verify the installed version.

Verify Fix Applied:

Verify the installed version is newer than 4.6.1.9996 and test that Windows accessibility features cannot be abused for privilege escalation.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected activation of Windows narrator or accessibility features
  • Creation of unusual desktop shortcuts
  • Processes running with elevated privileges from kiosk user context

Network Indicators:

  • Unusual outbound connections from kiosk systems
  • Attempts to download additional payloads

SIEM Query:

EventID 4688 OR Process Creation events showing narrator.exe or shortcut-related processes with elevated privileges from kiosk user accounts

🔗 References

📤 Share & Export