Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

DLL Hijacking Vulnerability Found in Realtek HD Audio Driver

A vulnerability in the Realtek HD Audio Driver package could be abused to execute arbitrary payloads with elevated privileges on a vulnerable machine, SafeBreach Labs has discovered.

Tracked as CVE-2019-19705, the vulnerability could be leveraged to evade defenses and achieve persistence by loading an arbitrary, unsigned DLL into a signed process.

A vulnerability in the Realtek HD Audio Driver package could be abused to execute arbitrary payloads with elevated privileges on a vulnerable machine, SafeBreach Labs has discovered.

Tracked as CVE-2019-19705, the vulnerability could be leveraged to evade defenses and achieve persistence by loading an arbitrary, unsigned DLL into a signed process.

The Realtek HD Audio Driver package is present on all Windows machines that feature a Realtek sound card, rendering all of them vulnerable to attacks. Exploitation, however, requires the attacker to have administrator privileges.

While analyzing the RAVBg64.exe process, which essentially is the background process of the Realtek driver, SafeBreach’s security researchers discovered that it runs with System privileges, but that it attempts to load a couple of specific DLLs in an unsafe manner.

The issue, the researchers explain, is not only that the process attempts to load DLLs that are not present at the expected location, but it also executes these, although they are supposed to be data-only DLLs.

RAVBg64.exe is an MFC application, meaning that its developers can load resource-only DLLs. However, instead of loading said DLLs with a specific flag, it loads them as regular DLLs, which results in their execution.

There are two root causes of the problem, SafeBreach says, the first being that Realtek used Visual Studio 2005 to compile the binary, which resulted in the implementation of the wrong behavior in the MFC application.

Second, no digital signature validation was being performed on the loaded DLLs, thus allowing for the loading of unsigned, arbitrary libraries.

Advertisement. Scroll to continue reading.

An attacker targeting the vulnerability could load and execute malicious payloads within the context of the Realtek signed process. This allows them to evade defenses and achieve persistence.

The vulnerability was reported to the vendor in July last year and was addressed with the release of Realtek HD Audio Driver package version 1.0.0.8856 in December.

Realtek published an advisory (DOCX) detailing this vulnerability only in January, confirming the potential to load unexepected code into the process.

Related: Vulnerabilities in Device Drivers From 20 Vendors Expose PCs to Persistent Malware

Related: Intel Driver Vulnerability Can Give Attackers Deep Access to a Device

Related: Vulnerabilities Disclosed in Kaspersky, Trend Micro Products

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.