{"id":23800,"date":"2024-01-26T09:20:57","date_gmt":"2024-01-26T17:20:57","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/01\/26\/news-17530\/"},"modified":"2024-01-26T09:20:57","modified_gmt":"2024-01-26T17:20:57","slug":"news-17530","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/01\/26\/news-17530\/","title":{"rendered":"Multiple vulnerabilities discovered in widely used security driver"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/01\/shutterstock_2044463684.jpg\"\/><\/p>\n<p><strong>Credit to Author: Angela Gunn| Date: Thu, 25 Jan 2024 19:00:52 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>In July 2023, our proactive behavior rules triggered on an attempt to load a driver named pskmad_64.sys (Panda Memory Access Driver) on a protected machine. The driver is owned by Panda Security and used in many of their products.<\/p>\n<p>Due to the rise in legitimate driver abuse with the goal of disabling EDR products (an issue we examined in our piece on compromised <a href=\"https:\/\/news.sophos.com\/en-us\/2023\/07\/11\/microsoft-revokes-malicious-drivers-in-patch-tuesday-culling\/\">Microsoft signed drivers<\/a> several months ago), and the context in which that driver was loaded, we started to investigate and dove deeper into the file.<\/p>\n<p>After re-evaluation and engagement with the customer, the original incident was identified as an APT simulation test. Our investigation, however, led to the discovery of three distinct vulnerabilities we reported to the Panda security team. These vulnerabilities, now tracked as CVE-2023-6330, CVE-2023-6331, and CVE-2023-6332, have been addressed by Panda. Information from Panda on the vulnerabilities and fixes for them can be found as noted for each CVE below.<\/p>\n<h2>Findings by CVE<\/h2>\n<h3>CVE-2023-6330 (Registry)<\/h3>\n<p><strong>Description<\/strong><\/p>\n<p>The registry hive \\REGISTRY\\MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion contains multiple useful pieces of information used to determine the OS version. The CSDVersion represents the Service Pack level of the operation system. CSDBuildNumber is the number of the corresponding build.<\/p>\n<p>The driver pskmad_64.sys does not properly validate the content of these registry values. An attacker can place maliciously crafted content into CSDBuildNumber or CSDVersion, which results in a non-paged memory overflow.<\/p>\n<p><strong>Impact<\/strong><\/p>\n<p>The minimum impact is a denial of service. With additional research, an attacker might be able to achieve RCE by chaining CVE-2023-6330 with other vulnerabilities. The CVSS base score for this vulnerability is 6.4 and Panda assesses it as being of medium potential impact.<\/p>\n<p>The full advisory for this issue is available on the WatchGuard site as <a href=\"https:\/\/www.watchguard.com\/wgrd-psirt\/advisory\/wgsa-2024-00001\">WGSA-2024-00001<\/a>, \u201cWatchGuard Endpoint pskmad_64.sys Pool Memory Corruption Vulnerability.\u201d<\/p>\n<h3>CVE-2023-6331 (OutOfBoundsRead)<\/h3>\n<p><strong>Description<\/strong><\/p>\n<p>By sending a maliciously crafted packet via an IRP request with IOCTL code 0xB3702C08 to the driver, an attacker can overflow a non-paged memory area, resulting in a memory-out-of-bounds write. The vulnerability exists due to missing bounds check when moving data via memmove to a non-paged memory pool.<\/p>\n<p><strong>Impact<\/strong><\/p>\n<p>The minimum impact is a denial of service. With additional research, an attacker might be able to achieve remote code execution when CVE-2023-6331 is combined with other vulnerabilities. The CVSS base score for this vulnerability is also 6.4, but Panda assesses it as being of high potential impact.<\/p>\n<p>The full advisory for this issue is available on the WatchGuard site as <a href=\"https:\/\/www.watchguard.com\/wgrd-psirt\/advisory\/wgsa-2024-00002\">WGSA-2024-00002<\/a>, \u201cWatchGuard Endpoint pskmad_64.sys Out of Bounds Write Vulnerability.\u201d<\/p>\n<h3>CVE-2023-6332 (Arbitrary Read)<\/h3>\n<p><strong>Description<\/strong><\/p>\n<p>Due to insufficient validation in the kernel driver, an attacker can send an IOCTL request with code 0xB3702C08 to read directly from kernel memory, resulting in an arbitrary read vulnerability.<\/p>\n<p><strong>Impact<\/strong><\/p>\n<p>The attacker can use this vulnerability to leak sensitive data, or chain it with other vulnerabilities to craft a more sophisticated and higher-impact exploit. The CVSS base score for this vulnerability is 4.1, and Panda assesses it as being of medium potential impact.<\/p>\n<p>The full advisory for this issue is available on the WatchGuard site as <a href=\"https:\/\/www.watchguard.com\/wgrd-psirt\/advisory\/wgsa-2024-00003\">WGSA-2024-00003<\/a>, \u201cWatchGuard Endpoint pskmad_64.sys Arbitrary Memory Read Vulnerability.\u201d<\/p>\n<h2>Affected Products<\/h2>\n<p>The file we investigated has the SHA256 value 2dd05470567e6d101505a834f52d5f46e0d0a0b57d05b9126bbe5b39ccb6af68 and file version 1.1.0.21. Out of an abundance of caution, while Panda undertook its investigation, we treated all earlier versions of the file as potentially vulnerable as we awaited the results of Panda\u2019s own investigation; their investigation confirmed this approach.<\/p>\n<p>As stated in Panda\u2019s advisories, the affected driver is included in the following products:<\/p>\n<ul>\n<li>WatchGuard EPDR (EPP, EDR, EPDR) and Panda AD360 up to 8.00.22.0023<\/li>\n<li>Panda Dome up to 22.02.01 (Essential, Advanced, Complete, and Premium versions)<\/li>\n<\/ul>\n<p>The fixed version of Panda Dome, the consumer product, is 22.02.01. The fixed version of WatchGuard EPDR and AD360, the enterprise product, is 8.0.22.0023.<\/p>\n<h2>Timeline<\/h2>\n<p><strong>2023-08-28<\/strong>: Proof of concept and detailed writeup sent to the Panda security team.<\/p>\n<p><strong>2023-09-21<\/strong>: Panda security team responded and acknowledged our report.<\/p>\n<p><strong>2023-10-30<\/strong>: Panda security team informed us of their plan to fix the issues.<\/p>\n<p><strong>2023-12-06<\/strong>: Panda informs us of the three CVEs assigned to these issues.<\/p>\n<p><strong>2024-01-18<\/strong>: Fixes released.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2024\/01\/25\/multiple-vulnerabilities-discovered-in-widely-used-security-driver\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/01\/shutterstock_2044463684.jpg\"\/><\/p>\n<p><strong>Credit to Author: Angela Gunn| Date: Thu, 25 Jan 2024 19:00:52 +0000<\/strong><\/p>\n<p>A false-alarm incident involving Panda Security software leads to three very real CVEs<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[30779,30780,30781,28131,129,30782,16771],"class_list":["post-23800","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-cve-2023-6330","tag-cve-2023-6331","tag-cve-2023-6332","tag-drivers","tag-featured","tag-panda-software","tag-threat-research"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23800"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23800\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23800"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}