K7 Antivirus: Named Pipe Abuse, Registry Manipulation, and Privilege Escalation

K7 Antivirus: Named Pipe Abuse, Registry Manipulation, and Privilege Escalation

An in-depth look at exploiting a vulnerability in K7 Ultimate Security to gain SYSTEM privileges via named pipes, tracing the discovery through to retro-analysis of key components. The piece covers the vulnerability lifecycle, multiple patches, and a disclosure timeline from Quarkslab, highlighting how defenders and vendors responded to evolving attack methods.
#CVE-2024-36424 #Quarkslab #K7Computing #K7UltimateSecurity #K7TSMngr

Keypoints

  • The investigation centers on privilege escalation opportunities in antivirus software using named pipes.
  • The K7TSMngrService1 named pipe becomes a focal point for elevated interactions by non-admin users.
  • Researchers show how changing settings or policies via the pipe could enable broader impact, including disabling protection.
  • The write-up covers a sequence of patches and bypass techniques, illustrating an ongoing cat-and-mouse between attackers and the vendor.
  • The analysis also discusses process protection (K7Sentry) and Image File Execution Options as avenues explored during exploitation and defense.

Read More: https://blog.quarkslab.com/k7-antivirus-named-pipe-abuse-registry-manipulation-and-privilege-escalation.html