stealthy pdf backdoor campaign

Security researchers uncovered a critical vulnerability in PDF24 Creator‘s MSI installer that lets attackers escalate privileges to SYSTEM level with disturbing ease. The flaw, designated CVE-2023-49147, affects versions up to 11.15.1 and carries a CVSS score of 7.8 – that’s HIGH for those keeping score at home.

Pretty terrifying when you think about how many businesses rely on PDF tools.

When common tools become attack vectors, the foundation of business security crumbles beneath our keyboards.

The exploit works through a clever trick. When running a repair function on the MSI installer, a cmd.exe window pops up with SYSTEM privileges. Normally, this window disappears quickly – blink and you’ll miss it. But attackers found they could freeze this process using an oplock on a specific log file. Game over.

What makes this vulnerability particularly nasty? No UAC popup appears during the attack. Zero warning. The attacker simply runs “msiexec.exe /fa” pointing to the PDF24 installer, sets the oplock, and boom – SYSTEM-level access. Full control of the victim’s machine.

And yes, there’s already a public proof-of-concept available online. Wonderful.

The attack requires local access and PDF24 Creator must be installed via MSI beforehand. Curiously, the EXE installer isn’t affected. Small mercies, right?

Geek Software GmbH, the vendor behind PDF24, released version 11.15.2 on December 8, 2023, patching this vulnerability. The fix came almost two months after discovery on October 16. Better late than never, I guess.

Users still running vulnerable versions should update immediately. The vulnerability specifically impacts the pdf24-PrinterInstall.exe subprocess which executes with elevated SYSTEM privileges during installation repair. Or switch to the EXE installer if they’re feeling particularly adventurous.

The exploitation chain relies on non-Edge browsers like Chrome or Firefox for initial setup. Once established, attackers gain complete system-level access. This means full control over everything. Absolutely everything.

Some users reported firewall alerts with pdf24-Toolbox.exe executing temporary .json files, but these appear unrelated to this specific vulnerability. Still. Not great for PR.

Security experts recommend a thorough security review by professionals immediately after installing the patch to ensure no backdoors were established before remediation.

Leave a Reply
You May Also Like

Miners Forced to Sell $348m of BTC as Power Costs Devour $7.4b Treasury

Bitcoin miners are in crisis, forced to liquidate assets as costs soar. Can they survive this economic storm and pivot to profitability?

Balancer Breach Empties Over $100 Million, Leaving DeFi Community Reeling

A staggering $116 million vanished in an audacious Balancer breach, exposing alarming vulnerabilities in DeFi security. What does this mean for the future of decentralized finance?

Crypto, AI and Hackers: The Alarming Rise of Digital Financial Crime

The staggering rise in digital financial crime could cost you millions. Are you prepared for the threats lurking in the shadows?

Thousands of AI Agents Join Viral Network, Teaching Each Other Key Theft and Demanding Bitcoin

A viral network of AI agents is teaching each other key theft and demanding Bitcoin. What could this mean for our digital future?