search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Portrait Displays SDK applications are vulnerable to arbitrary code execution and privilege escalation

Vulnerability Note VU#219739

Original Release Date: 2017-04-25 | Last Revised: 2017-04-25

Overview

Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution.

Description

CWE-276: Incorrect Default Permissions - CVE-2017-3210

A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges.

The following applications have been identified by Portrait Displays as affected:

    • Fujitsu DisplayView Click: Version 6.0 and 6.01
The issue was fixed in Version 6.3
    • Fujitsu DisplayView Click Suite: Version 5
The issue is addressed by patch in Version 5.9
    • HP Display Assistant: Version 2.1
The issue was fixed in Version 2.11
    • HP My Display: Version 2.0
The issue was fixed in Version 2.1
    • Philips Smart Control Premium: Versions 2.23, 2.25
The issue was fixed in Version 2.26

Impact

A local authenticated (non-privileged) attacker can run arbitrary code with SYSTEM privileges.

Solution

Apply an update

Ensure that affected applications are updated to the most recent versions.
Portrait Displays has provided patch for affected applications.

If you are unable to update your software, please see the following workarounds:

Manually remove unsafe permissions

Using the following command you can remove read/write permissions from "Authenticated Users":

sc sdset pdiservice D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)
(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

Vendor Information

219739
Expand all

Portrait Displays

Notified:  March 15, 2017 Updated:  April 24, 2017

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base 6.8 AV:L/AC:L/Au:S/C:C/I:C/A:C
Temporal 5.9 E:ND/RL:OF/RC:C
Environmental 1.5 CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Werner Schober of SEC Consult for reporting this vulnerability.

This document was written by Trent Novelly.

Other Information

CVE IDs: CVE-2017-3210
Date Public: 2017-04-24
Date First Published: 2017-04-25
Date Last Updated: 2017-04-25 16:58 UTC
Document Revision: 10

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.