CVE-2024-9491

8.6 HIGH

📋 TL;DR

This DLL hijacking vulnerability in Configuration Wizard 2 installer allows attackers to escalate privileges and execute arbitrary code by placing malicious DLLs in directories searched by the installer. It affects users running the vulnerable installer on Windows systems. The vulnerability stems from an uncontrolled search path (CWE-427).

💻 Affected Systems

Products:
  • Silicon Labs Configuration Wizard 2
Versions: All versions prior to the fixed release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when running the installer; post-installation systems are not affected. Requires attacker to place malicious DLL in a directory searched before the legitimate DLL.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM/administrator privileges, enabling complete control over the affected system, data theft, and lateral movement.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated permissions and install malware or backdoors on the system.

🟢

If Mitigated

Limited impact if proper application whitelisting and DLL search path restrictions are enforced, preventing unauthorized DLL loading.

🌐 Internet-Facing: LOW - This is a local attack requiring execution of the installer, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Significant risk in internal environments where users may run the installer, especially if combined with social engineering or other initial access vectors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to place malicious DLL in a directory with higher search priority than the legitimate DLL location. Social engineering may be needed to get user to run installer.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated Configuration Wizard 2 installer (specific version not specified in reference)

Vendor Advisory: https://community.silabs.com/068Vm00000JUQwd

Restart Required: No

Instructions:

1. Download the updated Configuration Wizard 2 installer from Silicon Labs. 2. Uninstall any existing vulnerable version. 3. Install the updated version. 4. Verify the fix by checking installer behavior.

🔧 Temporary Workarounds

Restrict DLL search path

Windows

Use Windows policies or application controls to restrict where DLLs can be loaded from, preventing loading from untrusted directories.

Use Group Policy: Computer Configuration > Windows Settings > Security Settings > Application Control Policies > AppLocker to create DLL rules

Run installer from secure location

all

Always run the installer from a trusted, write-protected directory to prevent DLL planting attacks.

🧯 If You Can't Patch

  • Implement strict application whitelisting to prevent unauthorized installer execution
  • Use least privilege accounts and avoid running installers with administrative privileges when possible

🔍 How to Verify

Check if Vulnerable:

Check if Configuration Wizard 2 installer version is older than the patched release. Monitor for DLL loading from unexpected directories during installer execution.

Check Version:

Check installer properties or installation directory for version information. For installed software, check Control Panel > Programs and Features.

Verify Fix Applied:

Test the updated installer to confirm it no longer searches untrusted directories for DLLs. Use Process Monitor to verify DLL loading behavior.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unexpected directories (Event ID 7 in Sysmon)
  • Application logs showing installer execution from unusual locations

Network Indicators:

  • Typically no network indicators as this is a local attack

SIEM Query:

EventID=7 AND (Image LIKE '%Configuration Wizard%' OR ProcessName LIKE '%ConfigWizard%') AND (TargetObject LIKE '%.dll' AND NOT TargetObject LIKE '%System32%' AND NOT TargetObject LIKE '%Program Files%')

🔗 References

📤 Share & Export