CVE-2025-61161

8.4 HIGH

📋 TL;DR

A DLL hijacking vulnerability in Evope Collector 1.1.6.9.0 allows local unprivileged attackers to execute arbitrary code with SYSTEM privileges by placing a malicious wtsapi32.dll in C:\ProgramData\Evope. The vulnerability affects systems running the vulnerable Evope.Service.exe component, which automatically loads the DLL on startup or reboot.

💻 Affected Systems

Products:
  • Evope Collector
Versions: 1.1.6.9.0 and possibly related components
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable Evope.Service.exe runs with SYSTEM privileges by default. The C:\ProgramData\Evope directory may have weak permissions allowing unprivileged users to write files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege escalation leading to complete system compromise, data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation to SYSTEM by authenticated low-privilege users, enabling installation of malware, credential harvesting, or lateral movement.

🟢

If Mitigated

Limited impact if proper file permissions prevent DLL placement or if the service runs with reduced privileges.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to write to C:\ProgramData\Evope. The referenced blog post demonstrates proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.evope.tech/

Restart Required: Yes

Instructions:

1. Check vendor website for security updates. 2. If patch available, download and install. 3. Restart system to ensure vulnerable service reloads with fixed version.

🔧 Temporary Workarounds

Restrict directory permissions

windows

Set strict permissions on C:\ProgramData\Evope to prevent unprivileged users from writing DLL files.

icacls "C:\ProgramData\Evope" /inheritance:r
icacls "C:\ProgramData\Evope" /grant "SYSTEM:(OI)(CI)F" /grant "Administrators:(OI)(CI)F"

Remove vulnerable service

windows

Uninstall or disable Evope.Service.exe if not required.

sc stop Evope.Service
sc delete Evope.Service

🧯 If You Can't Patch

  • Apply strict file permissions to C:\ProgramData\Evope directory to prevent DLL placement by unprivileged users.
  • Monitor for suspicious DLL creation in C:\ProgramData\Evope and unauthorized service execution.

🔍 How to Verify

Check if Vulnerable:

Check if C:\ProgramData\Evope directory exists and has weak permissions allowing write access to standard users. Verify Evope.Service.exe version is 1.1.6.9.0.

Check Version:

wmic product where "name like 'Evope%'" get version

Verify Fix Applied:

Confirm directory permissions restrict write access to SYSTEM and Administrators only. Verify service no longer loads wtsapi32.dll from uncontrolled path.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688: New process creation for Evope.Service.exe loading wtsapi32.dll from C:\ProgramData\Evope
  • Event ID 4663: File creation/modification in C:\ProgramData\Evope\wtsapi32.dll

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="Windows Security" EventID=4688 OR EventID=4663 AND (process_name="Evope.Service.exe" OR file_path="C:\\ProgramData\\Evope\\wtsapi32.dll")

🔗 References

📤 Share & Export