CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Lifecycle Timeline
3Description
Improper restriction of communication channel to intended endpoints issue exists in UpdateNavi V1.4 L10 to L33 and UpdateNaviInstallService Service 1.2.0091 to 1.2.0125. If a local authenticated attacker send malicious data, an arbitrary registry value may be modified or arbitrary code may be executed.
Analysis
Privilege escalation vulnerability in UpdateNavi and UpdateNaviInstallService that allows local authenticated attackers to modify arbitrary registry values or execute arbitrary code through improper communication channel restrictions. Affected versions include UpdateNavi V1.4 L10-L33 and UpdateNaviInstallService 1.2.0091-1.2.0125. With a CVSS score of 7.1 and local attack vector requiring low privileges, this vulnerability poses significant risk to systems running vulnerable versions, particularly in scenarios where local user accounts have network access or elevation paths.
Technical Context
This vulnerability stems from CWE-923 (Improper Restriction of Communication Channel to Intended Endpoints), which indicates the affected software fails to properly validate or restrict which entities can communicate with critical system components. UpdateNavi and UpdateNaviInstallService are software update and installation services that typically operate with elevated privileges and interact with Windows registry. The improper channel restriction allows authenticated local users to inject malicious data that bypasses intended communication safeguards, leading to unvalidated registry modifications or code execution in the service context. The vulnerability affects the communication protocols or IPC mechanisms between client processes and the privileged service components, suggesting inadequate input validation or endpoint authentication on the service side.
Affected Products
UpdateNavi (V1.4 L10 through L33); UpdateNaviInstallService (1.2.0091 through 1.2.0125)
Remediation
Upgrade UpdateNavi to version L34 or later; priority: Critical Upgrade UpdateNaviInstallService to version 1.2.0126 or later; priority: Critical Workaround: Restrict local user account privileges to minimum necessary; enforce strong local access controls and disable non-essential local user accounts on systems running vulnerable versions; priority: High Workaround: Monitor Windows Event Viewer for suspicious registry modification attempts and unusual UpdateNavi/UpdateNaviInstallService service activity; priority: Medium Mitigation: Implement application whitelisting to restrict execution from UpdateNavi service contexts; use AppLocker or Windows Defender Application Control (WDAC); priority: High Detection: Monitor for CWE-923 exploitation patterns: unauthorized registry writes to HKLM\, unexpected child processes from service context, and malformed IPC communication attempts to UpdateNavi services; priority: Medium
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18161