Sploit.io - Search

Product: M-Files, version: < 22.6

CVE-2023-0213

Severity: HIGH

Description: Elevation of privilege issue in M-Files Installer versions before 22.6 on Windows allows user to gain SYSTEM privileges via DLL hijacking.

CVSS Score: 8.8

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000440000
  • Percentile: 0.147780000
  • Date: 2025-01-20

ExploitDB

No data available.

HackerOne Data

  • Rank: 7458
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • M-Files M-Files - Versions: 0

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2023-0213 is a local elevation of privilege issue in the M-Files Installer for versions prior to 22.6 on Windows systems. This flaw allows an attacker with low-privileged access to exploit DLL hijacking to gain SYSTEM-level privileges. The CVSS v3.1 base score of 8.8 (HIGH) underscores the severity of this vulnerability, with high impacts on confidentiality, integrity, and availability.

    The nature of this vulnerability lies in its exploitation of an uncontrolled search path element (CWE-427), which enables attackers to manipulate the DLL loading process. The likelihood of exploitation is moderate, given that it requires local access and low privileges, but the ease of exploitation is high due to the straightforward nature of DLL hijacking techniques.

    Business impacts are significant, as successful exploitation could lead to complete system compromise. Attackers could exfiltrate sensitive data, modify or delete critical files, and disrupt system operations. The scope of the vulnerability is changed, meaning it could affect resources beyond the compromised system, amplifying its potential impact.

    2. Potential Attack Scenarios
    A potential attack scenario involves an insider threat or an attacker who has gained initial access to a low-privileged user account on a Windows system running an affected version of M-Files. The attacker could place a malicious DLL in a directory that is searched before the legitimate DLL during the M-Files Installer's execution. When the installer runs, it loads the malicious DLL instead of the legitimate one, granting the attacker SYSTEM privileges.

    With SYSTEM-level access, the attacker could install additional malware, disable security controls, or pivot to other systems within the network. The potential outcomes include data breaches, ransomware deployment, or persistent access to the compromised environment. This scenario is particularly dangerous in environments where M-Files is used to manage sensitive or proprietary information.

    3. Mitigation Recommendations
    The primary mitigation for this vulnerability is to update the M-Files Installer to version 22.6 or newer. This update addresses the DLL hijacking issue and prevents exploitation. Organizations should prioritize this update, especially on systems where M-Files is deployed in critical or sensitive environments.

    Additionally, organizations should implement the following best practices:
    - Restrict local user privileges to minimize the attack surface.
    - Monitor and control the execution of installer files and DLLs using application whitelisting or endpoint detection and response (EDR) solutions.
    - Conduct regular security audits to identify and remediate potential misconfigurations or vulnerabilities.

    For further guidance, refer to the official M-Files security advisory: https://product.m-files.com/security-advisories/cve-2023-0213/.

    4. Executive Summary
    CVE-2023-0213 is a high-severity vulnerability in the M-Files Installer that allows attackers with low-privileged access to escalate their privileges to SYSTEM level through DLL hijacking. This could lead to complete system compromise, data breaches, and operational disruptions.

    The vulnerability is relatively easy to exploit and poses a significant risk to organizations using affected versions of M-Files. Immediate action is required to mitigate this risk, including updating to M-Files version 22.6 or newer and implementing additional security controls to limit local privilege escalation opportunities.

    Addressing this vulnerability is critical to protecting sensitive data, maintaining system integrity, and ensuring business continuity. Organizations should treat this issue with urgency and prioritize patching and security hardening efforts to safeguard their environments.