CVE-2024-9496

8.6 HIGH

📋 TL;DR

This CVE describes a DLL hijacking vulnerability in the USBXpress Dev Kit installer where an uncontrolled search path allows attackers to place malicious DLLs in directories searched before the legitimate ones. This can lead to privilege escalation and arbitrary code execution when the installer runs. Users who install or run the USBXpress Dev Kit installer are affected.

💻 Affected Systems

Products:
  • USBXpress Dev Kit
Versions: All versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the installer itself, requiring execution of the installer package.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM/root privileges, enabling persistent backdoors, data theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative rights on the compromised system and execute arbitrary code.

🟢

If Mitigated

Limited impact with proper user account controls, application whitelisting, and restricted installation privileges preventing DLL placement.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to place malicious DLL and trigger installer execution. No authentication bypass needed once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updated installer version referenced in vendor advisory

Vendor Advisory: https://community.silabs.com/068Vm00000JUQwd

Restart Required: No

Instructions:

1. Download the updated USBXpress Dev Kit installer from Silicon Labs. 2. Uninstall any existing vulnerable version. 3. Install the updated version. 4. Verify installation with version check.

🔧 Temporary Workarounds

Restrict installer execution

Windows

Limit who can run the USBXpress Dev Kit installer to trusted administrators only

Enable DLL search path hardening

Windows

Configure Windows to use safe DLL search order

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Remove or restrict execution permissions for the USBXpress Dev Kit installer from non-admin users
  • Implement application control/whitelisting to prevent unauthorized installer execution

🔍 How to Verify

Check if Vulnerable:

Check if USBXpress Dev Kit installer exists on system and verify version against vendor advisory

Check Version:

Check installer properties or installed programs list for USBXpress Dev Kit version

Verify Fix Applied:

Confirm installation of updated version from Silicon Labs and verify DLL search path behavior

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing process creation for USBXpress installer from unusual locations
  • DLL loading events from unexpected directories

Network Indicators:

  • Unusual outbound connections following installer execution

SIEM Query:

Process creation where parent process is installer and image loaded from user-writable directory

🔗 References

📤 Share & Export