[Fixed] A vulnerability in KAVKIS 2020 products family allows full disabling of protection

Disclosed: 2021-03-31 08:33:27 By abbadeed To kaspersky
High
Vulnerability Details
> Note! Thank you for your report. For the purposes of the further analysis of the vulnerability, that you kindly report to us, could you please fill *all* fields [in square brackets]. This information will help us to respond you more quickly and triage your report. Thanks a lot for your assistance. I use Translator, T_T Sorry **Summary** can turn off anti-virus functionality in an external process. **Description** Use the SetWindowsHookEx function to inject the DLL. The ClientLoadLibrary was hooked to prevent injection, but dlls with specific file names were injectable(tiptsf.dll). After that, I was able to hook some WinAPIs and turn off antivirus. **Environment** - Scope: Application - Product name: Kaspersky Internet Security - Product version:20.0.14.1085 - OS name and version (incl SP): Windows 10 RS5 - Attack type: Bypass - Maximum user privileges needed to reproduce your issue: no privileges **Steps to reproduce** 1. FindWindow and get hwnd from kaspersky internet security(avpui.exe) 2. I have invoked the SetWindowsHookEx function to inject the DLL. 3. After hooking the TrackPopupMenu function, send a pop-up message through PostMessage. 4. When self-protection is turned on, it generates a new avpui.exe and then generates a Dialog that asks users to confirm. the generated process also injects dll. 5. In the newly created avpui.exe, hook the IsDialogMessageW function and switch to a message that occurs when you click the OK button. 6. download ransomware & run. ## Impact The bypass function can be used to turn off the antivirus before the malware is activated.
Actions
View on HackerOne
Report Stats
  • Report ID: 870615
  • State: Closed
  • Substate: resolved
  • Upvotes: 15
Share this report