Yannick Chairi | Chairi.IT

Advisory: Sidexis 4 Local Privilege Escalation Vulnerability
Disclose Date: 2022-10-20
Author: Yannick Chairi
CVE: CVE-2022-44263


Application: Sidexis 4  Version: <= 4.3 (maybe more, only this is confirmed)
Risk: Critical
Vendor Status: Disclosed


Overview:

	The System is delivered and maintained in this state directly by Sirona. 
	The System has an installation of Sidexis 4, a software for reviewing and 
	creating x-rays. Sidexis 4 runs with a Service called Sidexis Service, 
	that Service calls "C:\Program Files\Sirona\SIDEXIS4\SidexisRestService.exe" 
	The Service itself uses a special Service User called "sidexis4service", 
	that User has Local Administrative Privileges. It is possible to hijack 
	that service to gain local administrative privileges on the system affected.


Details:

	The Binary "C:\Program Files\Sirona\SIDEXIS4\SidexisRestService.exe" has 
	Read/Write/Change Permission set for Everyone (Jeder) It is therefore 
	possible to manipulate or switch out the Binary "SidexisRestService.exe" 
	leading to unwanted code execution The Service runs under the context of 
	Local Administrator. An attacker who was able to gain access to that 
	system could abuse this vulnerability to gain local administrative 
	permissions to gain full control over the system


Additional Infos:

	The root folder C:\Program Files\Sirona\ and C:\Program Files\Sirona\SIDEXIS4\ 
	have also Read/Write/Change Permission set for Everyone (Jeder) , and the Path
	of the service is not in quotes allowing also Insecure Service Path attack. 
	This indicates that these dangerous permissions happen during Installationtime 
	of Sidexis 4.


Disclosure Timeline:

  20. October 2022	-	Disclosure to vendor
  23. November 2022	-	CVE Number received, reminder sent to vendor
  25. January 2023	-	Disclosed to public