CVE-2024-21805
📋 TL;DR
This vulnerability allows authenticated Windows users on affected SKYSEA Client View systems to place arbitrary files in a specific folder. If a malicious DLL is placed there, it can be executed with SYSTEM privileges, leading to complete system compromise. Only users who can log into the Windows client are affected.
💻 Affected Systems
- SKYSEA Client View
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full SYSTEM privilege remote code execution leading to complete host takeover, lateral movement, and data exfiltration.
Likely Case
Privilege escalation from standard user to SYSTEM by authenticated attackers, enabling persistence and further exploitation.
If Mitigated
Limited to authenticated users only; proper access controls and patching prevent exploitation.
🎯 Exploit Status
Exploitation requires authenticated access and knowledge of the specific vulnerable folder path.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Ver.19.2
Vendor Advisory: https://www.skyseaclientview.net/news/240307_01/
Restart Required: Yes
Instructions:
1. Download SKYSEA Client View Ver.19.2 from vendor portal. 2. Run installer with administrative privileges. 3. Restart system after installation completes.
🔧 Temporary Workarounds
Restrict folder permissions
windowsModify ACLs on the vulnerable folder to prevent unauthorized file writes
icacls "C:\Path\To\Vulnerable\Folder" /deny Users:(OI)(CI)W
Remove vulnerable folder
windowsDelete or rename the specific vulnerable folder if not required for functionality
rmdir /s /q "C:\Path\To\Vulnerable\Folder"
🧯 If You Can't Patch
- Implement strict least-privilege access controls for all user accounts
- Monitor for suspicious file writes to the vulnerable folder path
🔍 How to Verify
Check if Vulnerable:
Check SKYSEA Client View version via Control Panel > Programs and Features, or run 'wmic product get name,version' and look for versions 16.100 through 19.1
Check Version:
wmic product where "name like '%SKYSEA Client View%'" get version
Verify Fix Applied:
Confirm version is 19.2 or higher using same method, and verify folder permissions are properly restricted
📡 Detection & Monitoring
Log Indicators:
- File creation events in the vulnerable folder path
- Process execution with SYSTEM privileges from unusual locations
Network Indicators:
- Unusual outbound connections from SYSTEM processes
SIEM Query:
EventID=4663 AND ObjectName="*vulnerable\folder\path*" OR ProcessName="rundll32.exe" AND ParentProcess="explorer.exe"