CVE-2025-66715

6.5 MEDIUM

📋 TL;DR

This DLL hijacking vulnerability in Axtion ODISSAAS ODIS v1.8.4 allows attackers to place a malicious DLL in a location where the application searches for legitimate DLLs, enabling arbitrary code execution. Organizations using this specific version of ODISSAAS ODIS are affected. The vulnerability requires local access or the ability to place files on the target system.

💻 Affected Systems

Products:
  • Axtion ODISSAAS ODIS
Versions: v1.8.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows OS where DLL search order vulnerabilities are common. The application must be running with sufficient privileges for the exploit to be impactful.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, data theft, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive ODIS data and potential credential harvesting.

🟢

If Mitigated

Limited impact if proper file permissions and application whitelisting prevent DLL placement in vulnerable directories.

🌐 Internet-Facing: LOW - This requires local file placement, making direct internet exploitation unlikely without additional attack vectors.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking is a well-known technique with readily available tools. Exploitation requires the ability to place a DLL file in a specific directory accessible to the application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.axtion.nl/odis/

Restart Required: No

Instructions:

Check the vendor website for security updates. If a patch is released, download and install it according to vendor instructions.

🔧 Temporary Workarounds

Restrict DLL Search Path

windows

Configure the application to use absolute paths for DLL loading or set the SafeDllSearchMode registry key to restrict DLL search order.

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v SafeDllSearchMode /t REG_DWORD /d 1 /f

File System Permissions

windows

Set strict permissions on application directories to prevent unauthorized users from writing DLL files.

icacls "C:\Program Files\ODIS" /deny Everyone:(OI)(CI)(W)

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized DLLs.
  • Monitor for suspicious DLL file creation in application directories using file integrity monitoring.

🔍 How to Verify

Check if Vulnerable:

Check if ODIS v1.8.4 is installed by examining the application version in the program files directory or via the vendor's update mechanism.

Check Version:

Check the application executable properties or installation directory for version information.

Verify Fix Applied:

Verify that the application no longer loads DLLs from untrusted directories by testing with a benign test DLL and monitoring DLL load events.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL load events from unusual locations (Event ID 7 in Sysmon)
  • Application logs indicating unexpected DLL loading errors

Network Indicators:

  • Unusual outbound connections from the ODIS process post-exploitation

SIEM Query:

EventID=7 AND (Image LIKE '%odis%' OR Image LIKE '%ODIS%') AND (ImageLoaded NOT LIKE '%system32%' AND ImageLoaded NOT LIKE '%program files%')

🔗 References

📤 Share & Export