CVE-2024-45873

9.8 CRITICAL

📋 TL;DR

A DLL hijacking vulnerability in VegaBird Yaazhini 2.0.2 allows attackers to execute arbitrary code by placing a malicious DLL in the same directory as the executable. This affects all users running the vulnerable version of Yaazhini software.

💻 Affected Systems

Products:
  • VegaBird Yaazhini
Versions: 2.0.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining persistent administrative access, data theft, and lateral movement capabilities.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive data and system resources.

🟢

If Mitigated

Limited impact if proper file permissions and execution controls prevent DLL placement in application directories.

🌐 Internet-Facing: LOW - Requires local access or ability to place files in application directory.
🏢 Internal Only: HIGH - Internal attackers or malware with file write capabilities can exploit this for persistence.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires ability to write files to application directory, which typically requires some level of access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://vegabird.com

Restart Required: No

Instructions:

Check vendor website for updates. If patch available, download and install latest version from official source.

🔧 Temporary Workarounds

Restrict File Permissions

windows

Set strict file permissions on Yaazhini installation directory to prevent unauthorized DLL placement.

icacls "C:\Program Files\VegaBird\Yaazhini" /deny Everyone:(OI)(CI)(W)

Use Application Whitelisting

windows

Implement application control policies to only allow execution of signed Yaazhini binaries.

🧯 If You Can't Patch

  • Monitor application directory for unauthorized DLL file creation
  • Implement least privilege access controls to limit who can write to application directories

🔍 How to Verify

Check if Vulnerable:

Check if Yaazhini version is 2.0.2 and if unauthorized users can write to its installation directory.

Check Version:

Check application properties or About dialog in Yaazhini interface

Verify Fix Applied:

Verify updated version number and test if DLL hijacking attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DLL loads from Yaazhini directory
  • File creation events in Yaazhini installation path

Network Indicators:

  • Unusual outbound connections from Yaazhini process

SIEM Query:

EventID=11 AND ProcessName="Yaazhini.exe" AND ImageLoaded contains ".dll"

🔗 References

📤 Share & Export