Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

DLL Hijacking Vulnerability Found in Realtek HD Audio Driver

A vulnerability in the Realtek HD Audio Driver package could be abused to execute arbitrary payloads with elevated privileges on a vulnerable machine, SafeBreach Labs has discovered.

Tracked as CVE-2019-19705, the vulnerability could be leveraged to evade defenses and achieve persistence by loading an arbitrary, unsigned DLL into a signed process.

A vulnerability in the Realtek HD Audio Driver package could be abused to execute arbitrary payloads with elevated privileges on a vulnerable machine, SafeBreach Labs has discovered.

Tracked as CVE-2019-19705, the vulnerability could be leveraged to evade defenses and achieve persistence by loading an arbitrary, unsigned DLL into a signed process.

The Realtek HD Audio Driver package is present on all Windows machines that feature a Realtek sound card, rendering all of them vulnerable to attacks. Exploitation, however, requires the attacker to have administrator privileges.

While analyzing the RAVBg64.exe process, which essentially is the background process of the Realtek driver, SafeBreach’s security researchers discovered that it runs with System privileges, but that it attempts to load a couple of specific DLLs in an unsafe manner.

The issue, the researchers explain, is not only that the process attempts to load DLLs that are not present at the expected location, but it also executes these, although they are supposed to be data-only DLLs.

RAVBg64.exe is an MFC application, meaning that its developers can load resource-only DLLs. However, instead of loading said DLLs with a specific flag, it loads them as regular DLLs, which results in their execution.

There are two root causes of the problem, SafeBreach says, the first being that Realtek used Visual Studio 2005 to compile the binary, which resulted in the implementation of the wrong behavior in the MFC application.

Second, no digital signature validation was being performed on the loaded DLLs, thus allowing for the loading of unsigned, arbitrary libraries.

Advertisement. Scroll to continue reading.

An attacker targeting the vulnerability could load and execute malicious payloads within the context of the Realtek signed process. This allows them to evade defenses and achieve persistence.

The vulnerability was reported to the vendor in July last year and was addressed with the release of Realtek HD Audio Driver package version 1.0.0.8856 in December.

Realtek published an advisory (DOCX) detailing this vulnerability only in January, confirming the potential to load unexepected code into the process.

Related: Vulnerabilities in Device Drivers From 20 Vendors Expose PCs to Persistent Malware

Related: Intel Driver Vulnerability Can Give Attackers Deep Access to a Device

Related: Vulnerabilities Disclosed in Kaspersky, Trend Micro Products

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

Paul Calatayud has been named CISO of developer security posture management firm Archipelo.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.