CVE-2024-57394

8.8 HIGH

📋 TL;DR

This vulnerability in Qi-ANXIN Tianqing Endpoint Security Management System allows authenticated users to restore quarantined malicious files to arbitrary system paths. Attackers can exploit this to write malicious DLLs to system directories and perform privilege escalation via DLL hijacking. Organizations using version 10.0 of this endpoint security software are affected.

💻 Affected Systems

Products:
  • Qi-ANXIN Tianqing Endpoint Security Management System
Versions: v10.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the quarantine restore functionality. DLL hijacking component specifically affects Windows systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through privilege escalation to SYSTEM/administrator level, enabling lateral movement, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative privileges on compromised endpoints, potentially leading to credential theft and further network access.

🟢

If Mitigated

Limited impact if proper access controls, application whitelisting, and DLL hijacking protections are implemented.

🌐 Internet-Facing: LOW - This appears to require local access or authenticated access to the management system.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Public proof-of-concept available on GitHub. Requires authenticated access but the exploit chain is well-documented. DLL hijacking techniques are well-known in Windows environments.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://en.qianxin.com/product/detail/165

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. Apply any available patches. 3. Verify the quarantine-restore function no longer allows arbitrary path writing.

🔧 Temporary Workarounds

Restrict Quarantine Access

all

Limit access to quarantine restore functionality to trusted administrators only.

Enable DLL Protection

windows

Configure Windows to prevent DLL hijacking attacks.

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager" -Name "CWDIllegalInDllSearch" -Value 0x1

🧯 If You Can't Patch

  • Implement strict access controls on the Tianqing management interface
  • Deploy application control/whitelisting to prevent unauthorized DLL execution

🔍 How to Verify

Check if Vulnerable:

Test if authenticated users can restore quarantined files to arbitrary system paths using the management interface.

Check Version:

Check software version in Tianqing management console or via vendor documentation

Verify Fix Applied:

Verify that quarantine restore function validates destination paths and prevents writing to system directories.

📡 Detection & Monitoring

Log Indicators:

  • Unusual quarantine restore operations
  • DLL writes to system directories from Tianqing process
  • Privilege escalation attempts following quarantine operations

Network Indicators:

  • Unusual authentication patterns to Tianqing management interface
  • Lateral movement following endpoint compromise

SIEM Query:

source="tianqing" AND (event="quarantine_restore" OR event="file_write") AND path="*system32*"

🔗 References

📤 Share & Export