CVE-2023-3842

7.8 HIGH

📋 TL;DR

This vulnerability in Pointware EasyInventory 1.0.12.0 involves an unquoted search path in the Easy2W.exe executable, allowing local attackers to execute arbitrary code by placing malicious files in directories with spaces in their names. It affects users running the vulnerable version on Windows systems with local access to the installation directory. The vendor has not responded to disclosure attempts.

💻 Affected Systems

Products:
  • Pointware EasyInventory
Versions: 1.0.12.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system where EasyInventory is installed. The vulnerability is in the executable file path handling.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to SYSTEM-level access, enabling complete system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Local attackers gain code execution with the privileges of the user running EasyInventory, potentially leading to lateral movement within the network.

🟢

If Mitigated

Limited impact if proper access controls prevent unauthorized local users from writing to the installation directory.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly reachable from the internet.
🏢 Internal Only: HIGH - Local attackers on the same system can exploit this vulnerability to escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to write to directories in the search path. No public exploit code is currently known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider workarounds or discontinuing use of the software.

🔧 Temporary Workarounds

Quote Executable Path

windows

Modify shortcuts or scripts to use quoted paths when launching Easy2W.exe

Change shortcuts from 'C:\Program Files (x86)\EasyInventory\Easy2W.exe' to '"C:\Program Files (x86)\EasyInventory\Easy2W.exe"'

Restrict Directory Permissions

windows

Set strict permissions on the EasyInventory installation directory to prevent unauthorized writes

icacls "C:\Program Files (x86)\EasyInventory" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Remove or restrict local user access to systems running EasyInventory
  • Monitor for unauthorized file creation in the EasyInventory directory and parent directories

🔍 How to Verify

Check if Vulnerable:

Check if EasyInventory 1.0.12.0 is installed and if Easy2W.exe is launched with unquoted paths in shortcuts or scripts

Check Version:

Check the version in Help > About within the EasyInventory application or examine the executable properties

Verify Fix Applied:

Verify that all references to Easy2W.exe use quoted paths and directory permissions prevent unauthorized writes

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from Easy2W.exe parent directories
  • File creation events in EasyInventory directory by unauthorized users

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Process creation where parent directory contains spaces and executable name matches patterns like *Easy2W.exe

🔗 References

📤 Share & Export