Responsible Disclosure – Security Vulnerability in Accops USB Redirection Driver

3 min read - Dec 7, 2021

Overview
A local privilege escalation vulnerability in Accops products for Windows OS was recently discovered and responsibly disclosed to Accops. It was reported by SentinelOne, which is a reputed global cybersecurity company. The vulnerability has been fixed in Accops products.

The vulnerability affects customers who use Accops Virtual Desktop products only, more specifically described below.

The remediation prevented local users from executing arbitrary code with administrator privileges. There is no evidence that the vulnerability has been exploited and to our knowledge, no customer is impacted.

Applies to the following Accops product(s) and version(s)
• Accops HyWorks Client version 3.2.8.180 or prior, for Windows with built-in USB redirection
• Accops HyWorks DVM Tools version 3.3.1.102 or prior, for Windows 7/8/10 based Virtual Desktops

Detection & remediation
• The HyWorks Client endpoint can be checked for any affect due to the vulnerability and fixed, if needed, by
running a utility provided by Accops
• The fix is included in HyWorks Client version 3.2.8.200, released August 21, 2021
• The fix is included in HyWorks DVM Tools version 3.3.1.105, released as part of HyWorks version 3.3 – R3 on
October 14, 2021

Detailed remediation document
We have published a detailed document providing steps to remediate the vulnerability.

Vulnerability CVE IDs given below

CVE-2021-42688 An Integer Overflow vulnerability exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22005B in the Accops HyWorks Windows Client prior to v 3.2.8.200 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CVE-2021-42687 A Buffer Overflow vulnerability exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22005B allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CVE-2021-42686 An Integer Overflow exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22001B in the Accops HyWorks Windows Client prior to v 3.2.8.200 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CVE-2021-42685 An Integer Overflow vulnerability exists in Accops HyWorks DVM Tools prior to v3.3.1.105 . The IOCTL Handler 0x22005B in the Accops HyWorks DVM Tools prior to v3.3.1.105 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CVE-2021-42683 A Buffer Overflow vulnerability exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22001B allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CVE-2021-42682 An Integer Overflow vulnerability exists in Accops HyWorks DVM Tools prior to v3.3.1.105 .The IOCTL Handler 0x22001B allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CVE-2021-42681 A Buffer Overflow vulnerability exists in Accops HyWorks DVM Tools prior to v3.3.1.105. The IOCTL Handler 0x22001B allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.

Search results for “Accops” at the official CVE website.

You may also like

Dec 7, 2021
Portrait of Vijender Yadav
Author
Vijender Yadav
Co-founder, MD & CEO
Vijender Yadav is the Co-founder, Managing Director, and CEO of Accops, a leading provider of secure remote access and digital workspace solutions. With over two decades of experience in product development and technical product marketing in the enterprise mobility and virtualization domain, Vijender has been instrumental in driving innovation and business growth at Accops.

Ready to Secure Your Hybrid Workspace?

Join 500+ enterprises that trust Accops to protect their workforce. Get started with a personalized demo today.


Fatal error: Uncaught ErrorException: md5_file(/opt/bitnami/wordpress/wp-content/litespeed/css/641ef697589367a3cb55939cf318dbe6.css.tmp): Failed to open stream: No such file or directory in /bitnami/wordpress/wp-content/plugins/litespeed-cache/src/optimizer.cls.php:148 Stack trace: #0 [internal function]: litespeed_exception_handler() #1 /bitnami/wordpress/wp-content/plugins/litespeed-cache/src/optimizer.cls.php(148): md5_file() #2 /bitnami/wordpress/wp-content/plugins/litespeed-cache/src/optimize.cls.php(845): LiteSpeed\Optimizer->serve() #3 /bitnami/wordpress/wp-content/plugins/litespeed-cache/src/optimize.cls.php(338): LiteSpeed\Optimize->_build_hash_url() #4 /bitnami/wordpress/wp-content/plugins/litespeed-cache/src/optimize.cls.php(265): LiteSpeed\Optimize->_optimize() #5 /bitnami/wordpress/wp-content/plugins/litespeed-cache/src/optimize.cls.php(226): LiteSpeed\Optimize->_finalize() #6 /opt/bitnami/wordpress/wp-includes/class-wp-hook.php(341): LiteSpeed\Optimize->finalize() #7 /opt/bitnami/wordpress/wp-includes/plugin.php(205): WP_Hook->apply_filters() #8 /bitnami/wordpress/wp-content/plugins/litespeed-cache/src/core.cls.php(464): apply_filters() #9 [internal function]: LiteSpeed\Core->send_headers_force() #10 /opt/bitnami/wordpress/wp-includes/functions.php(5481): ob_end_flush() #11 /opt/bitnami/wordpress/wp-includes/class-wp-hook.php(341): wp_ob_end_flush_all() #12 /opt/bitnami/wordpress/wp-includes/class-wp-hook.php(365): WP_Hook->apply_filters() #13 /opt/bitnami/wordpress/wp-includes/plugin.php(522): WP_Hook->do_action() #14 /opt/bitnami/wordpress/wp-includes/load.php(1308): do_action() #15 [internal function]: shutdown_action_hook() #16 {main} thrown in /bitnami/wordpress/wp-content/plugins/litespeed-cache/src/optimizer.cls.php on line 148