CVE-2023-45160

8.8 HIGH

📋 TL;DR

This vulnerability allows ordinary users to replace downloaded instruction resource files with malicious scripts in the 1E Client. Attackers could execute arbitrary code by substituting legitimate script files with harmful ones at runtime. Affects 1E Client users on both Windows and macOS systems.

💻 Affected Systems

Products:
  • 1E Client
Versions: Pre-patch versions on Windows; Mac Client versions higher than v8.1 but below v23.11
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Windows systems require patch Q23094; macOS systems need v23.11 or later. Non-Windows release v8.1.2.62 also fixes the issue.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution with user privileges, potentially leading to lateral movement, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or execution of malicious scripts within the user's context, enabling data access, persistence mechanisms, or credential harvesting.

🟢

If Mitigated

Limited impact due to proper access controls and monitoring, with only user-level access achievable and quick detection of anomalous file modifications.

🌐 Internet-Facing: LOW - This is primarily a local privilege escalation vulnerability requiring user access to the system.
🏢 Internal Only: HIGH - Internal users with standard privileges can exploit this to gain elevated access or execute malicious payloads on managed endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local user access but involves simple file replacement techniques. No authentication bypass needed beyond standard user privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Windows: patch Q23094; macOS: v23.11 or Non-Windows release v8.1.2.62

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2023-2002/

Restart Required: Yes

Instructions:

1. Download the appropriate patch from the 1E Support site. 2. Apply patch Q23094 for Windows systems. 3. For macOS, upgrade to v23.11 or download updated Non-Windows release v8.1.2.62. 4. Restart affected systems. 5. Verify the temporary directory lockdown is in place.

🔧 Temporary Workarounds

Restrict temporary directory permissions

all

Manually lock down the 1E Client's temporary directory to prevent unauthorized file modifications

# Windows: icacls "C:\ProgramData\1E\Temporary" /deny Users:(OI)(CI)(W,R,X)
# macOS: chmod 750 /path/to/1e/temporary/directory

🧯 If You Can't Patch

  • Implement strict file integrity monitoring on the 1E Client temporary directory to detect unauthorized modifications.
  • Apply principle of least privilege by restricting user write access to the temporary directory through group policies or configuration management.

🔍 How to Verify

Check if Vulnerable:

Check if the 1E Client temporary directory allows user write access and if files can be replaced during instruction execution.

Check Version:

# Windows: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*1E*'} | Select-Object Name, Version
# macOS: /usr/local/bin/1e-client --version or check installed package version

Verify Fix Applied:

Verify that the temporary directory is properly locked down and test that user-level file replacement attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file modifications in 1E temporary directories
  • Unexpected script executions from 1E Client locations
  • Access denied errors for legitimate 1E processes

Network Indicators:

  • Unusual outbound connections from 1E Client processes
  • Downloads to 1E temporary directories from untrusted sources

SIEM Query:

source="*1e*" AND (event_type="file_modification" OR event_type="process_execution") AND (file_path="*temporary*" OR process_path="*1e*")

🔗 References

📤 Share & Export