CVE-2024-22167

7.9 HIGH

📋 TL;DR

A DLL hijacking vulnerability in SanDisk PrivateAccess for Windows allows local attackers to execute arbitrary code with system privileges. This requires the attacker to already have access to the user's vault or system. Only Windows users of this specific application are affected.

💻 Affected Systems

Products:
  • SanDisk PrivateAccess Desktop Application
Versions: Versions prior to 6.4.11
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only exploitable if attacker has access to user's vault file or already compromised the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges leading to data theft, persistence, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation from a lower-privileged user account to SYSTEM, enabling further attacks on the compromised machine.

🟢

If Mitigated

Limited impact if proper access controls prevent unauthorized local access and vault files are secured.

🌐 Internet-Facing: LOW - This is a local attack requiring physical or remote access to the target system.
🏢 Internal Only: HIGH - Internal attackers with local access can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and specific conditions (vault access or existing compromise).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.11

Vendor Advisory: https://www.westerndigital.com/support/product-security/wdc-24002-sandisk-privateaccess-desktop-app-v-6-4-11

Restart Required: Yes

Instructions:

1. Download SanDisk PrivateAccess version 6.4.11 from official sources. 2. Run the installer. 3. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict DLL Search Path

windows

Use Windows policies to restrict DLL search paths and prevent loading from untrusted directories.

Configure via Group Policy: Computer Configuration > Windows Settings > Security Settings > Application Control Policies > DLL Rules

Remove Unnecessary Privileges

windows

Run SanDisk PrivateAccess with minimal required privileges instead of SYSTEM context.

Use Windows Task Scheduler or runas to execute with limited user account

🧯 If You Can't Patch

  • Restrict physical and remote access to systems running vulnerable versions.
  • Implement strict access controls on vault files and monitor for unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check SanDisk PrivateAccess version in Windows Programs and Features. If version is below 6.4.11, the system is vulnerable.

Check Version:

wmic product where name="SanDisk PrivateAccess" get version

Verify Fix Applied:

Confirm version shows 6.4.11 or higher in Programs and Features after update.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual paths
  • Process creation events for SanDisk PrivateAccess with suspicious parent processes

Network Indicators:

  • No network indicators - this is a local attack

SIEM Query:

EventID=4688 AND NewProcessName="*PrivateAccess*" AND ParentProcessName NOT IN ("explorer.exe", "svchost.exe")

🔗 References

📤 Share & Export