A vulnerability in the Realtek HD Audio Driver package could be abused to execute arbitrary payloads with elevated privileges on a vulnerable machine, SafeBreach Labs has discovered.
Tracked as CVE-2019-19705, the vulnerability could be leveraged to evade defenses and achieve persistence by loading an arbitrary, unsigned DLL into a signed process.
The Realtek HD Audio Driver package is present on all Windows machines that feature a Realtek sound card, rendering all of them vulnerable to attacks. Exploitation, however, requires the attacker to have administrator privileges.
While analyzing the RAVBg64.exe process, which essentially is the background process of the Realtek driver, SafeBreach’s security researchers discovered that it runs with System privileges, but that it attempts to load a couple of specific DLLs in an unsafe manner.
The issue, the researchers explain, is not only that the process attempts to load DLLs that are not present at the expected location, but it also executes these, although they are supposed to be data-only DLLs.
RAVBg64.exe is an MFC application, meaning that its developers can load resource-only DLLs. However, instead of loading said DLLs with a specific flag, it loads them as regular DLLs, which results in their execution.
There are two root causes of the problem, SafeBreach says, the first being that Realtek used Visual Studio 2005 to compile the binary, which resulted in the implementation of the wrong behavior in the MFC application.
Second, no digital signature validation was being performed on the loaded DLLs, thus allowing for the loading of unsigned, arbitrary libraries.
An attacker targeting the vulnerability could load and execute malicious payloads within the context of the Realtek signed process. This allows them to evade defenses and achieve persistence.
The vulnerability was reported to the vendor in July last year and was addressed with the release of Realtek HD Audio Driver package version 1.0.0.8856 in December.
Realtek published an advisory (DOCX) detailing this vulnerability only in January, confirming the potential to load unexepected code into the process.
Related: Vulnerabilities in Device Drivers From 20 Vendors Expose PCs to Persistent Malware
Related: Intel Driver Vulnerability Can Give Attackers Deep Access to a Device
Related: Vulnerabilities Disclosed in Kaspersky, Trend Micro Products

More from Ionut Arghire
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- Latitude Financial Services Data Breach Impacts 300,000 Customers
Latest News
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
