CVE-2025-45095

7.3 HIGH

📋 TL;DR

Lavasoft Web Companion (Ad-Aware WebCompanion) versions 8.9.0.1091 through 12.1.3.1037 have an unquoted service path vulnerability in DCIService.exe. Attackers with write access to the file system can place malicious executables in the unquoted path to execute arbitrary code with SYSTEM privileges. This affects all users running vulnerable versions of the software.

💻 Affected Systems

Products:
  • Lavasoft Web Companion
  • Ad-Aware WebCompanion
Versions: 8.9.0.1091 through 12.1.3.1037
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation configuration. Requires write access to the file system where the unquoted path exists.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges leading to complete control over the affected machine, data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation where an attacker with initial access gains SYSTEM privileges to install malware, steal credentials, or move laterally within the network.

🟢

If Mitigated

Limited impact if proper file system permissions prevent unauthorized writes to affected directories and endpoint protection blocks malicious executables.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires write access to the file system. The vulnerability is well-documented with proof-of-concept available in the reference link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check current version using 'sc qc DCIService' command
2. If version is between 8.9.0.1091 and 12.1.3.1037, uninstall Lavasoft Web Companion
3. Consider alternative web protection software

🔧 Temporary Workarounds

Add quotes to service path

windows

Manually add quotes around the service path in Windows Registry to prevent exploitation

sc config DCIService binPath= "\"C:\Program Files\Lavasoft\Web Companion\Application\DCIService.exe\""

Restrict file system permissions

windows

Set strict ACLs on directories in the unquoted path to prevent unauthorized writes

icacls "C:\Program Files\Lavasoft" /deny Everyone:(OI)(CI)(W)

🧯 If You Can't Patch

  • Uninstall Lavasoft Web Companion completely
  • Implement strict file system permissions and monitor for unauthorized file creation in affected directories

🔍 How to Verify

Check if Vulnerable:

Run 'sc qc DCIService' and check if the BinaryPathName value is unquoted and contains spaces. Also check version using 'wmic product where name="Lavasoft Web Companion" get version'

Check Version:

wmic product where name="Lavasoft Web Companion" get version

Verify Fix Applied:

Verify service path is quoted by running 'sc qc DCIService' and checking BinaryPathName starts and ends with quotes

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 showing DCIService.exe execution from unexpected locations
  • File creation events in Lavasoft installation directories
  • Process creation from suspicious paths

Network Indicators:

  • Unusual outbound connections from DCIService.exe
  • Beaconing behavior from the service

SIEM Query:

source="windows" event_id=4688 AND (process_name="DCIService.exe" AND NOT (process_path="C:\\Program Files\\Lavasoft\\Web Companion\\Application\\DCIService.exe"))

🔗 References

📤 Share & Export