Search
UP-TO-DATE

Blog

Our employees frequently engage in research projects to live up to the high standard. They analyze the latest topics, methods and tools in interesting information security areas and prepare them in this context. The results of these activities contribute, for example, to projects, lectures at conferences, market overviews and articles for technical journals as well in advisories and zero-day vulnerabilities.

Blog Articles

Red Teaming

The Key to COMpromise – Part 4

February 26, 2025 – In this final part of our series on COM hijacking, we will examine a custom-named pipe IPC protocol implemented by Bitdefender Total Security and detail our approach to reverse engineering it. We will explore how we could use COM hijacking and this custom communication to gain SYSTEM privileges (CVE-2023-6154). Additionally, we will examine how to mitigate the vulnerabilities discussed throughout this series of blog posts. Lastly, we will demonstrate how COM hijacking can be exploited to perform a Denial-of-Service (DoS) attack on security products.

Author: Alain Rödel and Kolja Grassmann

Read more »
Red Teaming

The Key to COMpromise – Part 3

February 12, 2025 – In this third part of our blog post series, we will cover the details of two additional vulnerabilities we found based on COM hijacking. The first vulnerability impacted Webroot Endpoint Protect (CVE-2023-7241), allowing us to leverage an arbitrary file deletion to gain SYSTEM privileges. In the second case, we targeted Checkpoint Harmony (CVE-2024-24912) and used a file download primitive to gain SYSTEM privileges.

Author: Alain Rödel and Kolja Grassmann

Read more »
Red Teaming

The Key to COMpromise – Part 2

January 29, 2025 – In this post, we will delve into how we exploited trust in AVG Internet Security (CVE-2024-6510) to gain elevated privileges.
But before that, the next section will detail how we overcame an allow-listing mechanism that initially disrupted our COM hijacking attempts.

Author: Alain Rödel and Kolja Grassmann

Read more »
Red Teaming

TLPT: Bedroh­ungs­­­orientierte Penetra­tions­tests nach DORA

January 24, 2025 – Since January 17, 2025, the Digital Operational Resilience Act (DORA) has been put into practice. One important aspect of DORA is the requirement of regularly performing threat-led penetration tests (TLPT). Only selected entities within the financial sector are required to conduct TLPTs. Even though TLPTs sound like a new concept, they have actually existed in Germany since 2020 in form of TIBER tests. This blog post describes the concepts behind TLPTs and how they are conducted. Furthermore, alternatives for targeted and budget-oriented red team assessments are given.

Author: Michael Brügge

Read more »
Red Teaming

The Key to COMpromise – Part 1

January 15, 2025 – In this series of blog posts, we cover how we could exploit five reputable security products to gain SYSTEM privileges with COM hijacking. If you’ve never heard of this, no worries. We introduce all relevant background information, describe our approach to reverse engineering the products’ internals, and explain how we finally exploited the vulnerabilities. We hope to shed some light on this undervalued attack surface.

Author: Alain Rödel and Kolja Grassmann

Read more »
Identity

Wer hat das Elster-Zertifikat weiterge­geben?

December 3, 2024 – The German government has introduced a government-provided electronic identity for its citizens, the BundID. Authentication for this ID can be – among other things – achieved using a certificate file that was introduced for submitting tax returns. However, many citizens share this certificate file either with people that do the taxes for them or with online services that provide easier interfaces for doing your taxes. As a result, many people’s online identities are at risk.

Author: Benjamin Häublein

Read more »

Research

Advisories

Vulnerability in Trend Micro Apex One (CVE-2024-55631)

January 8, 2025 – Our colleagues Frederik Reiter and Jan-Luca Gruber found a vulnerability in the Damage Cleanup Engine of Trend Micro Apex One, which allows and attacker to delete a folder with high privileges. This can be leveraged to escalate privileges in the context of SYSTEM.

Read more »

Vulnerabilities

cirosec conducts vulnerability research into products and services, which at times results in zero-day vulnerabilities being discovered.

cirosec follows a responsible disclosure policy when dealing with zero-day vulnerabilities found during research or customer projects. The goal is to balance the need of giving the vendor or open-source project enough time to develop and distribute a fix for the vulnerability with the need of the public to know about the security vulnerability. The policy is in accordance with industry-standard responsible disclosure practices. Our responsible disclosure policy can be found here.

Below is a list of CVEs vulnerabilities identified or assigned by cirosec and presented here for reference and cataloguing.

VulnerabilityCVECVSS ScorePublication DateMore Details
Vulnerability in Elaborate Bytes Virtual Clone Drive [ext]CVE-2025-18657.8 (CVSS v3.1)April 4, 2025Changelog
Vulnerability in Mobatek MobaXtermCVE-2025-07146.5 (CVSS v3.1)February 17, 2025Advisory
Vulnerability in Intel AMTCVE-2024-383077.7 (CVSS v3.1)February 11, 2025Intel
Vulnerability in G DATA Management Server [ext]CVE-2025-05427.8 (CVSS v3.1)January 24, 2025Advisory
Vulnerability in G DATA Security Client [ext]CVE-2025-05437.8 (CVSS v3.1)January 24, 2025Advisory
Vulnerability in Trend Micro Apex OneCVE-2024-556317.8 (CVSS v3.1)January 8, 2025Advisory, Trend Micro
Vulnerability in HP Hotkey SupportCVE-2024-274588.8 (CVSS v3.1)October 4, 2024Advisory, HP
Vulnerability in AVG Internet SecurityCVE-2024-65107.8 (CVSS v3.1)September 12, 2024Advisory
Vulnerability in OverwolfCVE-2024-78347.8 (CVSS v3.1)September 4, 2024Advisory
Vulnerability in baramundi Management AgentCVE-2024-66897.8 (CVSS v3.1)July 15, 2024Advisory, baramundi
Vulnerability in Trend Micro Apex OneCVE-2024-363027.8 (CVSS v3.1)July 1, 2024ZDI-Advisory, Trend Micro
Vulnerability in Checkpoint HarmonyCVE-2024-249127.8 (CVSS v3.1)May 1, 2024Advisory, Checkpoint
Vulnerability in Webroot AntivirusCVE-2023-72417.8 (CVSS v3.1)May 1, 2024Advisory, Webroot
Vulnerability in BitdefenderCVE-2023-61547.8 (CVSS v3.1)April 1, 2024Advisory, Bitdefender
Vulnerability in neo42 Sumatra PDF Package 7.8 (CVSS v3.1)November 7, 2023Advisory
Vulnerability in Bytello Share 7.8 (CVSS v3.1)November 6, 2023Advisory
Vulnerability in Kiteworks OwnCloudCVE-2023-72736.8 (CVSS v3.1)November 4, 2023Advisory
Vulnerability in VMware WorkstationCVE-2023-208547.8 (CVSS v3.1)February 3, 2023Advisory, VMware
Vulnerability in Remote Access Software from RealVNCCVE-2022-419757.8 (CVSS v3.1)September 30, 2022AdvisoryRealVNC

Blogs - Overview

TitleAuthorPublication DateCategory
The Key to COMpromise – Part 3Alain Rödel and Kolja GrassmannFebruary 12, 2025Red Teaming
The Key to COMpromise – Part 2Alain Rödel and Kolja GrassmannJanuary 15, 2025Red Teaming
TLPT: Bedrohungsorientierte Penetrationstests nach DORAMichael BrüggeJanuary 24, 2025Red Teaming
The Key to COMpromise Part 1Alain Rödel and Kolja GrassmannJanuary 15, 2025Red Teaming
Wer hat das Elster-Zertifikat weitergegeben?Benjamin HäubleinDecember 3, 2024Identity
Google DoC2Frederik ReiterNovember 7, 2024Command-and-Control, Red Teaming
Abusing Microsoft Warbird for Shellcode ExecutionJan-Luca Gruber & Frederik ReiterNovember 7, 2024Red Teaming, Reverse Engineering, Windows
Inside the NAC PiLeon SchmidtJuly 5, 2024Red Teaming
Loader Dev. 5 – Loading our payloadKolja GrassmannMay 10, 2024Red Teaming
Loader Dev. 4 – AMSI and ETWKolja GrassmannApril 30, 2024Red Teaming
Loader Dev. 3 – Evading userspace hooksKolja GrassmannApril 10, 2024Red Teaming
Loader Dev. 2 – Dynamically resolving functionsKolja GrassmannMarch 10, 2024Red Teaming
Loader Dev. 1 – BasicsKolja GrassmannFebruary 10, 2024Red Teaming
Microsoft Tiering Model – Part 3/3Hagen MolzerJanuary 10, 2024AD Security
Microsoft Tiering Model – Part 2/3Hagen MolzerDecember 10, 2023AD Security
Microsoft Tiering Model – Part 1/3Hagen MolzerNovember 10, 2023AD Security

Your contact person

Do you want to protect your systems? Feel free to get in touch with us.
Search
Search