CVE-2023-45252

7.8 HIGH

📋 TL;DR

A DLL hijacking vulnerability in HuddlyCameraService allows attackers to place malicious DLLs in the service directory, which standard users can write to. This enables arbitrary code execution and privilege escalation on affected systems. Users of Huddly camera software before version 8.0.7 (excluding 7.99) are affected.

💻 Affected Systems

Products:
  • Huddly HuddlyCameraService
Versions: All versions before 8.0.7, excluding version 7.99
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists due to service installation in a directory with write permissions for standard users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to SYSTEM/administrator level, enabling complete control over the device, data theft, and lateral movement.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated privileges, install malware, or manipulate system files.

🟢

If Mitigated

Limited impact with proper access controls preventing standard users from writing to service directories.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to exploit.
🏢 Internal Only: HIGH - Attackers with standard user access on affected systems can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access and standard user privileges. DLL hijacking is a well-known technique with established exploitation methods.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.7

Vendor Advisory: https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/

Restart Required: Yes

Instructions:

1. Download HuddlyCameraService version 8.0.7 or later from official Huddly sources. 2. Uninstall previous versions. 3. Install the updated version. 4. Restart the system to ensure service updates take effect.

🔧 Temporary Workarounds

Restrict directory permissions

windows

Modify permissions on the HuddlyCameraService installation directory to remove write access for standard users.

icacls "C:\Program Files\Huddly\HuddlyCameraService" /deny Users:(OI)(CI)W

Disable service if unused

windows

Stop and disable the HuddlyCameraService if Huddly cameras are not required.

sc stop HuddlyCameraService
sc config HuddlyCameraService start= disabled

🧯 If You Can't Patch

  • Implement strict access controls to prevent standard users from writing to the HuddlyCameraService directory.
  • Monitor for suspicious DLL files being created in the HuddlyCameraService directory and for unexpected service behavior.

🔍 How to Verify

Check if Vulnerable:

Check HuddlyCameraService version via Windows Services (services.msc) or registry at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall for version number. Verify if version is below 8.0.7 and not 7.99.

Check Version:

wmic service where "name='HuddlyCameraService'" get PathName

Verify Fix Applied:

Confirm HuddlyCameraService version is 8.0.7 or higher. Verify directory permissions do not allow standard users write access to the installation folder.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading errors from HuddlyCameraService
  • Unexpected DLL files in HuddlyCameraService directory
  • Service crashes or unexpected restarts

Network Indicators:

  • Unusual outbound connections from HuddlyCameraService process

SIEM Query:

Process creation where parent process is HuddlyCameraService.exe OR File creation in directory containing 'HuddlyCameraService'

🔗 References

📤 Share & Export