lobiap.blogg.se

Armoury crate asus rog
Armoury crate asus rog













armoury crate asus rog
  1. #Armoury crate asus rog software#
  2. #Armoury crate asus rog code#

#Armoury crate asus rog software#

This kind of software is usually poorly designed from a security perspective - not shaming ASUS here, it’s just a matter of fact as gaming software is usually not designed with security in mind, it has to be flashy and eye-catching - so I ended up focusing my effort on this particular piece of software.Īt login time, Armoury Crate’s own service, called Armoury Crate Lite Service, spawns a number of processes, the ones that caught my eyes though were Armour圜 and its child Armour圜. Last year I assembled a PC with an ASUS TUF motherboard, so I have this software installed. The main difference is that in standard ones the legitimate DLL exists and is overwritten or proxied by the attacker’s DLL, while in phantom DLL hijackings the process tries to load a non existing DLL, hence the attacker can just drop its malicious DLL in the path and call it a day.īy messing up with Process Monitor I ended up finding a phantom DLL hijacking in ASUS ROG Armoury Crate, a software commonly installed in gaming PCs with a TUF/ROG motherboard to manage LEDs and fans. There are essentially two kinds of DLL hijackings: standard DLL hijackings and phantom DLL hijackings. To make a process load your DLL you have to control the path from which said DLL is loaded. A DLL hijacking revolves around forcing a process to run an attacker controlled DLL instead of the legitimate DLL the process is trying to load, nothing more. Greetings fellow hackers, last here! Recently I’ve been looking for vulnerabilities here and there - too much free time maybe? Specifically, I focused on hunting for DLL hijackings in privileged processes, as they usually lead to a local privilege escalation. The vulnerability has been assigned ID CVE-2021-40981. The issue has been fixed with the release of Armoury Crate Lite Service 4.2.10.

armoury crate asus rog

To trigger the vulnerability, an administrator must log in after the attacker has placed the malicious DLL at the path C:\ProgramData\ASUS\GamingCenterLib\.DLL.

#Armoury crate asus rog code#

ASUS ROG Armoury Crate ships with a service called Armoury Crate Lite Service which suffers from a phantom DLL hijacking vulnerability that allows a low privilege user to execute code in the context other users, administrators included.















Armoury crate asus rog