CVE-2023-41613

7.8 HIGH

📋 TL;DR

EzViz Studio v2.2.0 is vulnerable to DLL hijacking, allowing attackers to execute arbitrary code by placing malicious DLL files in directories where the application searches for them. This affects users running the vulnerable version of EzViz Studio on Windows systems. The vulnerability requires local access or social engineering to place malicious files.

💻 Affected Systems

Products:
  • EzViz Studio
Versions: 2.2.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows OS where DLL search order can be manipulated. The vulnerability exists in the default installation configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the EzViz Studio process, potentially leading to persistence, data theft, or lateral movement.

🟠

Likely Case

Local privilege escalation or arbitrary code execution in the context of the EzViz Studio user, allowing attackers to install malware, steal credentials, or access sensitive data.

🟢

If Mitigated

Limited impact if proper application whitelisting, DLL signing verification, or least privilege principles are enforced.

🌐 Internet-Facing: LOW - This is primarily a local attack vector requiring file placement on the target system.
🏢 Internal Only: MEDIUM - Internal attackers with access to place files on target systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires placing malicious DLL files in specific directories that EzViz Studio searches. Public proof-of-concept details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check with EzViz/Hikvision for updated versions. If unavailable, apply workarounds and monitor for security updates.

🔧 Temporary Workarounds

Restrict DLL Search Path

windows

Use Windows policies or application controls to restrict where EzViz Studio can load DLLs from.

Use Windows AppLocker or Software Restriction Policies to block DLL execution from untrusted locations

Remove Unnecessary Permissions

windows

Run EzViz Studio with least privilege and remove write permissions from directories it searches.

icacls "C:\Program Files\EzViz Studio" /deny Users:(OI)(CI)W
Run EzViz Studio as standard user, not administrator

🧯 If You Can't Patch

  • Uninstall EzViz Studio if not required
  • Implement strict application control policies to prevent unauthorized DLL execution

🔍 How to Verify

Check if Vulnerable:

Check if EzViz Studio version 2.2.0 is installed. Test by placing a test DLL in application directories and monitoring if it gets loaded.

Check Version:

Check Help > About in EzViz Studio or examine installed programs in Control Panel

Verify Fix Applied:

Verify updated version is installed or workarounds prevent DLL loading from untrusted locations.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Process Monitor logs showing EzViz Studio accessing unexpected DLL files

Network Indicators:

  • Unusual outbound connections from EzViz Studio process after exploitation

SIEM Query:

Process creation where parent process is EzViz Studio and command line contains suspicious DLL paths

🔗 References

📤 Share & Export