CVE-2024-42053

7.8 HIGH

📋 TL;DR

This vulnerability allows local users on Windows systems to escalate privileges to SYSTEM by exploiting weak permissions in a temporary folder used during Splashtop Streamer installation. Attackers can place a malicious version.dll file to gain full system control. Only affects Windows systems running vulnerable versions of Splashtop Streamer.

💻 Affected Systems

Products:
  • Splashtop Streamer for Windows
Versions: All versions before 3.6.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. The vulnerability exists during installation/update processes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM privileges, enabling complete system compromise, installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local user or malware with initial access escalates to SYSTEM to bypass security controls, install additional payloads, or maintain persistence.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring initial access to the system.
🏢 Internal Only: HIGH - Any compromised internal workstation with vulnerable software could lead to full domain compromise through privilege escalation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to the system. The technique involves DLL hijacking in a weakly-permissioned temporary folder.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.6.0.0

Vendor Advisory: https://support-splashtopbusiness.splashtop.com/hc/en-us/articles/18223802896539-Splashtop-Streamer-version-v3-6-0-0-for-Windows-released

Restart Required: Yes

Instructions:

1. Download Splashtop Streamer version 3.6.0.0 or later from official sources. 2. Run the installer with administrative privileges. 3. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict temporary folder permissions

windows

Manually secure the temporary installation folder to prevent unauthorized file creation

icacls "C:\ProgramData\SplashtopStreamerTemp" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" /grant:r "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(W)"

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit local user permissions
  • Monitor for suspicious DLL creation in temporary folders and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Splashtop Streamer version in Control Panel > Programs and Features. If version is below 3.6.0.0, system is vulnerable.

Check Version:

wmic product where "name like 'Splashtop%Streamer%'" get version

Verify Fix Applied:

Verify version is 3.6.0.0 or higher in Control Panel > Programs and Features. Check that temporary installation folder has proper permissions.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Security logs showing privilege escalation attempts
  • Process creation events for unexpected SYSTEM-level processes

Network Indicators:

  • Unusual outbound connections from SYSTEM processes
  • Lateral movement attempts from previously low-privilege systems

SIEM Query:

source="windows_security" EventID=4688 NewProcessName="*version.dll" OR ParentProcessName="*Splashtop*"

🔗 References

📤 Share & Export