CVE-2025-26860

7.8 HIGH

📋 TL;DR

CVE-2025-26860 is a DLL hijacking vulnerability in RemoteCall Remote Support Program (for Operator) that allows attackers to execute arbitrary code by placing a malicious DLL in the same directory as the application. This affects all versions prior to 5.1.0. Organizations using this remote support software are at risk if attackers can place files in application directories.

💻 Affected Systems

Products:
  • RemoteCall Remote Support Program (for Operator)
Versions: All versions prior to 5.1.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Operator component, not the Client component. Requires attacker ability to place DLL in application directory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing attackers to install malware, steal credentials, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive data, system configuration changes, or installation of backdoors on affected workstations.

🟢

If Mitigated

Limited impact with proper file permissions preventing DLL placement, though the vulnerability remains present in the software.

🌐 Internet-Facing: LOW - This requires local file placement, making remote exploitation difficult without additional attack vectors.
🏢 Internal Only: MEDIUM - Internal attackers or malware with local access could exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local file system access to place malicious DLL. No authentication bypass needed if attacker can write to application directory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1.0

Vendor Advisory: https://www.remotecall.com/en/support/download/

Restart Required: Yes

Instructions:

1. Download version 5.1.0 or later from RemoteCall website. 2. Uninstall previous version. 3. Install new version. 4. Restart system.

🔧 Temporary Workarounds

Restrict directory permissions

windows

Set strict file permissions on RemoteCall installation directory to prevent unauthorized DLL placement

icacls "C:\Program Files\RemoteCall" /deny Everyone:(OI)(CI)(WD,AD)

Use application whitelisting

windows

Configure Windows Defender Application Control or similar to only allow signed DLLs to load

🧯 If You Can't Patch

  • Monitor for unauthorized DLL files in RemoteCall directories using file integrity monitoring
  • Implement least privilege access controls to limit who can write to application directories

🔍 How to Verify

Check if Vulnerable:

Check RemoteCall version in Help > About. If version is below 5.1.0, the system is vulnerable.

Check Version:

wmic product where name="RemoteCall" get version

Verify Fix Applied:

Verify version is 5.1.0 or higher in Help > About. Test by attempting to place a test DLL in the installation directory (should be blocked if permissions are properly configured).

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Process Monitor logs showing DLL hijacking attempts

Network Indicators:

  • Unusual outbound connections from RemoteCall process after DLL loading

SIEM Query:

EventID=7 AND (ImagePath:*RemoteCall* OR ProcessName:RemoteCall*) AND (ImageLoaded:*dll)

🔗 References

📤 Share & Export