CVE-2023-54336

8.4 HIGH

📋 TL;DR

CVE-2023-54336 is an unquoted service path vulnerability in Mediconta 3.7.27 that allows local attackers to execute arbitrary code with LocalSystem privileges. This occurs because the service path C:\Program Files (x86)\medicont3\ is unquoted, enabling attackers to place malicious executables in directories that Windows will execute during service startup. Organizations running Mediconta 3.7.27 on Windows systems are affected.

💻 Affected Systems

Products:
  • Mediconta
Versions: 3.7.27
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems where Mediconta is installed in the default path. Requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with LocalSystem privileges, allowing attackers to install persistent backdoors, steal credentials, disable security controls, and pivot to other systems.

🟠

Likely Case

Local privilege escalation leading to persistence establishment, credential harvesting, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and service hardening are implemented.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Malicious insiders or attackers who gain initial access through other means can exploit this to escalate privileges and move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to create malicious executables in the unquoted path. Public exploit code is available on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.infonetsoftware.com

Restart Required: Yes

Instructions:

1. Check vendor website for updated version. 2. Uninstall vulnerable version. 3. Install patched version if available. 4. Restart system.

🔧 Temporary Workarounds

Add quotes to service path

windows

Modify the service configuration to include quotes around the executable path

sc config servermedicontservice binPath= "C:\Program Files (x86)\medicont3\servermedicontservice.exe"

Restrict directory permissions

windows

Remove write permissions for non-administrative users on the affected directories

icacls "C:\Program Files (x86)\medicont3" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict endpoint detection and response (EDR) to monitor for service path manipulation attempts
  • Apply principle of least privilege and restrict local user permissions on affected systems

🔍 How to Verify

Check if Vulnerable:

Check if Mediconta 3.7.27 is installed and verify the service path is unquoted using: sc qc servermedicontservice

Check Version:

Check program version in Control Panel > Programs and Features or via registry: reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s | findstr /i mediconta

Verify Fix Applied:

Verify the service path now contains quotes and directory permissions are restricted

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 7045: Service installation
  • Unexpected service path modifications
  • Creation of executables in C:\Program Files (x86)\medicont3\ directory

Network Indicators:

  • Unusual outbound connections from systems running Mediconta
  • Lateral movement attempts from affected systems

SIEM Query:

EventID=7045 AND (ServiceName="servermedicontservice" OR ImagePath="*medicont3*")

🔗 References

📤 Share & Export