Skip to main content

Security Advisory IBA-2021-01

Local privilege escalation

Publishing Date:2021-04-19
Last Update:2021-04-19
Tracking ID:IBA-2021-01
CVSS Base Score:7.8
CVSS Temporal Score:7.0
CVSS v3 Vector:CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:H/E:P/RL:O/RC:C

Summary

The functions ExecuteCommand as well as PostProcessing could be used to escalate the privileges of the local Windows user.

Affected products

ibaPDA-V7
ExecuteCommand: All versions prior to v7.3.0
PostProcessing: All versions prior to v7.3.0

ibaPDA-V6
ExecuteCommand: All versions since v6.33.3
PostProcessing: All versions

How do I know that I'm affected

Check the version number of the installed product in the About dialog which can be found in the Help menu.

Customer Actions

Upgrade to ibaPDA-V7 v7.3.0 and if the above mentioned functionality is used in your ibaPDA-Project, you have to provide user credentials to these functions. These credentials are then used to execute the commands.

Mitigations

If an upgrade/update to ibaPDA-V7 v7.3.0 is currently not possible, use the user management in earlier versions of ibaPDA to set the appropriate access rights, so the I/O configuration can't be changed. If scripts are being used, make sure that the script-files cannot be changed by the current Windows user.

Technical Details

Background

The above mentioned functionality ExecuteCommand and PostProcessing can execute any given command in the context of the ibaPDA service which needs the SYSTEM account to run.

Issue

Since the commands for ExecuteCommand as well as PostProcessing can be changed by any user who has the appropriate rights in ibaPDA it is possible for the user to escalate its privileges in Windows up to the administrative level.

Timeline

2019-04-01 Issue found by internal security team
2021-03-24 New software released with fix
2021-04-19 Security advisory published
|Security Advisories Back