CVE-2024-21805

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated Windows users on affected SKYSEA Client View systems to place arbitrary files in a specific folder. If a malicious DLL is placed there, it can be executed with SYSTEM privileges, leading to complete system compromise. Only users who can log into the Windows client are affected.

💻 Affected Systems

Products:
  • SKYSEA Client View
Versions: Ver.16.100 through Ver.19.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows client installations; requires local user authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege remote code execution leading to complete host takeover, lateral movement, and data exfiltration.

🟠

Likely Case

Privilege escalation from standard user to SYSTEM by authenticated attackers, enabling persistence and further exploitation.

🟢

If Mitigated

Limited to authenticated users only; proper access controls and patching prevent exploitation.

🌐 Internet-Facing: LOW - Requires local authentication to Windows client, not directly internet-exposed.
🏢 Internal Only: HIGH - Any authenticated internal user can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of the specific vulnerable folder path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Ver.19.2

Vendor Advisory: https://www.skyseaclientview.net/news/240307_01/

Restart Required: Yes

Instructions:

1. Download SKYSEA Client View Ver.19.2 from vendor portal. 2. Run installer with administrative privileges. 3. Restart system after installation completes.

🔧 Temporary Workarounds

Restrict folder permissions

windows

Modify ACLs on the vulnerable folder to prevent unauthorized file writes

icacls "C:\Path\To\Vulnerable\Folder" /deny Users:(OI)(CI)W

Remove vulnerable folder

windows

Delete or rename the specific vulnerable folder if not required for functionality

rmdir /s /q "C:\Path\To\Vulnerable\Folder"

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for all user accounts
  • Monitor for suspicious file writes to the vulnerable folder path

🔍 How to Verify

Check if Vulnerable:

Check SKYSEA Client View version via Control Panel > Programs and Features, or run 'wmic product get name,version' and look for versions 16.100 through 19.1

Check Version:

wmic product where "name like '%SKYSEA Client View%'" get version

Verify Fix Applied:

Confirm version is 19.2 or higher using same method, and verify folder permissions are properly restricted

📡 Detection & Monitoring

Log Indicators:

  • File creation events in the vulnerable folder path
  • Process execution with SYSTEM privileges from unusual locations

Network Indicators:

  • Unusual outbound connections from SYSTEM processes

SIEM Query:

EventID=4663 AND ObjectName="*vulnerable\folder\path*" OR ProcessName="rundll32.exe" AND ParentProcess="explorer.exe"

🔗 References

📤 Share & Export