CVE-2026-30896

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code with administrative privileges by placing malicious DLL files in the same directory as the Qsee Client installer. It affects users running Qsee Client version 1.0.1 or earlier who execute the installer from untrusted locations. The attack requires local access to place DLLs and user interaction to run the installer.

💻 Affected Systems

Products:
  • Qsee Client
Versions: 1.0.1 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the installer component, not the running application. Requires user to execute installer from directory containing malicious DLLs.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing installation of persistent malware, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation leading to malware installation or credential harvesting when users run installers from untrusted directories.

🟢

If Mitigated

Limited impact if users only run installers from trusted locations and follow security best practices.

🌐 Internet-Facing: LOW - This requires local file placement and user execution, not directly exploitable over the network.
🏢 Internal Only: MEDIUM - Internal attackers with access to shared directories could plant malicious DLLs for targeted users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local file system access to place DLLs and user interaction to run installer. DLL hijacking techniques are well-documented and easy to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor website for latest version

Vendor Advisory: https://www.q-see.com/pages/download

Restart Required: No

Instructions:

1. Visit https://www.q-see.com/pages/download 2. Download latest Qsee Client version 3. Uninstall old version 4. Install new version from trusted location

🔧 Temporary Workarounds

Safe Installation Directory

windows

Always run Qsee Client installer from trusted directories like Downloads or Desktop, never from shared or untrusted locations.

DLL Search Path Hardening

windows

Configure Windows to prioritize system directories over local directories when loading DLLs.

Set registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\SafeDllSearchMode to 1

🧯 If You Can't Patch

  • Restrict user permissions to prevent execution of installers from shared or untrusted directories
  • Implement application whitelisting to control which installers can run on systems

🔍 How to Verify

Check if Vulnerable:

Check Qsee Client version in installed programs list. If version is 1.0.1 or earlier, system is vulnerable.

Check Version:

wmic product where name="Qsee Client" get version

Verify Fix Applied:

Verify installed Qsee Client version is newer than 1.0.1 through program properties or vendor website.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing Qsee installer execution from unusual directories
  • Process creation events for Qsee installer with suspicious parent processes

Network Indicators:

  • Unusual outbound connections following Qsee installer execution

SIEM Query:

source="windows" AND (process_name="*qsee*" OR process_name="*installer*") AND file_path="*\\shared\\*" OR file_path="*\\temp\\*")

🔗 References

📤 Share & Export