CVE-2024-12168

7.8 HIGH

📋 TL;DR

Yandex Telemost for Desktop versions before 2.7.0 are vulnerable to DLL hijacking due to an untrusted search path. Attackers can place malicious DLLs in directories searched by the application, potentially executing arbitrary code when the application loads. This affects all users running vulnerable versions of Yandex Telemost for Desktop.

💻 Affected Systems

Products:
  • Yandex Telemost for Desktop
Versions: All versions before 2.7.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: DLL hijacking vulnerabilities typically affect Windows systems where the application searches for DLLs in directories that attackers can write to.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running Yandex Telemost, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or arbitrary code execution in the context of the user running the vulnerable application, allowing attackers to steal credentials, access sensitive files, or pivot to other systems.

🟢

If Mitigated

Limited impact if proper application control policies are in place, user privileges are restricted, and DLL search order hardening is implemented.

🌐 Internet-Facing: LOW - This is primarily a local attack vector requiring the attacker to place malicious DLLs on the target system or accessible network shares.
🏢 Internal Only: MEDIUM - Internal attackers with access to shared directories or ability to place files on target systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking is a well-known attack technique with established exploitation methods. Exploitation requires the attacker to place a malicious DLL in a directory that the application searches before legitimate system directories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.0

Vendor Advisory: https://yandex.com/bugbounty/i/hall-of-fame-products

Restart Required: Yes

Instructions:

1. Download Yandex Telemost for Desktop version 2.7.0 or later from official Yandex sources. 2. Uninstall the previous version. 3. Install the updated version. 4. Restart the system to ensure all components are properly loaded.

🔧 Temporary Workarounds

Restrict DLL Search Path

windows

Use Windows policies or application control solutions to restrict where Yandex Telemost can load DLLs from.

Set-ProcessMitigation -Name "telemost.exe" -Enable ForceRelocateImages
Use AppLocker or Windows Defender Application Control to restrict DLL loading

Remove Write Permissions

windows

Remove write permissions from directories that Yandex Telemost searches for DLLs before system directories.

icacls "C:\Program Files\Yandex\Telemost" /deny Users:(OI)(CI)W
icacls "%APPDATA%\Yandex\Telemost" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Run Yandex Telemost with minimal user privileges (not as administrator)
  • Implement application control policies to prevent execution of unauthorized DLLs
  • Monitor for suspicious DLL loading events in Windows Event Logs

🔍 How to Verify

Check if Vulnerable:

Check the Yandex Telemost version in the application's About section or via 'Get-ItemProperty' for the installation directory. Versions below 2.7.0 are vulnerable.

Check Version:

Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | Where-Object {$_.DisplayName -like "*Yandex Telemost*"} | Select-Object DisplayName, DisplayVersion

Verify Fix Applied:

Confirm the installed version is 2.7.0 or higher and test that the application functions normally after update.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (process creation) showing telemost.exe loading DLLs from unusual locations
  • Sysmon Event ID 7 (Image loaded) showing DLLs loaded from user-writable directories

Network Indicators:

  • Unusual network connections originating from telemost.exe process after DLL load

SIEM Query:

source="Windows Security" EventID=4688 AND ProcessName="*telemost.exe" AND CommandLine="*dll*" | stats count by Image, ParentProcessName, CommandLine

🔗 References

📤 Share & Export