<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-34546_NetSetManPro_4.7.2_%E6%AC%8A%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2021-34546 NetSetManPro 4.7.2 權限提升漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-34546_NetSetManPro_4.7.2_%E6%AC%8A%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-34546_NetSetManPro_4.7.2_%E6%AC%8A%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T07:59:09Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2021-34546_NetSetManPro_4.7.2_%E6%AC%8A%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E&amp;diff=4982&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256  Affected Products     NetSetManPro 4.7.2 (other/older releases have not been tested)  References     https://www.secuver...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-34546_NetSetManPro_4.7.2_%E6%AC%8A%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E&amp;diff=4982&amp;oldid=prev"/>
		<updated>2021-06-13T01:42:22Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256  Affected Products     NetSetManPro 4.7.2 (other/older releases have not been tested)  References     https://www.secuver...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
-----BEGIN PGP SIGNED MESSAGE-----&lt;br /&gt;
Hash: SHA256&lt;br /&gt;
&lt;br /&gt;
Affected Products&lt;br /&gt;
    NetSetManPro 4.7.2 (other/older releases have not been tested)&lt;br /&gt;
&lt;br /&gt;
References&lt;br /&gt;
    https://www.secuvera.de/advisories/secuvera-SA-2021-01.txt (used for &lt;br /&gt;
updates)&lt;br /&gt;
    CVE-2021-34546 &lt;br /&gt;
(https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34546)&lt;br /&gt;
&lt;br /&gt;
Summary:&lt;br /&gt;
    &amp;quot;NetSetMan is a network settings manager software for easily &lt;br /&gt;
switching between&lt;br /&gt;
    your preconfigured profiles.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
    The save file dialogue within the action log window after switching a &lt;br /&gt;
profile&lt;br /&gt;
    using the pre-logon profile switching (if intentionaly enabled) leads &lt;br /&gt;
to&lt;br /&gt;
    arbitrary command execution as system authority user enabling an &lt;br /&gt;
unauthenticated&lt;br /&gt;
    attacker to log on.&lt;br /&gt;
&lt;br /&gt;
Effect:&lt;br /&gt;
    An unauthenticated attacker with physical access to a computer with &lt;br /&gt;
NetSetMan Pro&lt;br /&gt;
    4.7.2 installed, that has the pre-logon profile switch activated (not &lt;br /&gt;
enabled by&lt;br /&gt;
    default) as button withinthe windows logon screen, is able to drop to &lt;br /&gt;
an admin-&lt;br /&gt;
    istrative shell and execute arbitrary commands as system user by the &lt;br /&gt;
use of the&lt;br /&gt;
    &amp;quot;save log to file&amp;quot; feature within NetSetMan Pro.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
    On a client computer running Microsoft Windows 10 and NetSetMan Pro &lt;br /&gt;
an Icon can&lt;br /&gt;
    appear on the Windows lock-screen if configured. The following steps &lt;br /&gt;
must be per-&lt;br /&gt;
    formed in order to gain an administrative shell:&lt;br /&gt;
    1. Boot the client system&lt;br /&gt;
    2. Click on the NetSetMan Pro Icon.&lt;br /&gt;
    3. Choose an user defined (empty) setting.&lt;br /&gt;
    4. Click on the &amp;quot;save&amp;quot; button in the appearing Window within the &lt;br /&gt;
&amp;quot;Log&amp;quot; section&lt;br /&gt;
       (save icon)&lt;br /&gt;
    5. Click on &amp;quot;File-Type&amp;quot; and Choose &amp;quot;*.*&amp;quot;&lt;br /&gt;
    6. Navigate to path &amp;quot;C:\Windows\System32\&amp;quot;&lt;br /&gt;
    7. Right-Click on on &amp;quot;cmd.exe&amp;quot; and choose &amp;quot;Run as administrator...&amp;quot;.&lt;br /&gt;
    8. The appearing command prompt has administrative rights.&lt;br /&gt;
&lt;br /&gt;
    To be able to bypass authentication a local user with administrative &lt;br /&gt;
rights can&lt;br /&gt;
    be added using the following commands:&lt;br /&gt;
    a. net user Pentest Password123! /add&lt;br /&gt;
    b. net localgroup Administrators Pentest /add&lt;br /&gt;
&lt;br /&gt;
Solution:&lt;br /&gt;
    Update to Version 5.0 or newer (5.0.6 was tested by the researcher).&lt;br /&gt;
&lt;br /&gt;
Disclosure Timeline:&lt;br /&gt;
    2021/05/17 vendor initially contacted, submitted all details.&lt;br /&gt;
    2021/05/17 vendor replied suggesting vulnerability already fixed&lt;br /&gt;
               in newer versions prior researcher contact&lt;br /&gt;
    2021/06/02 verified vendor suggested fix using version 5.0.6;&lt;br /&gt;
               updated advisory and contacted vendor again; vendor&lt;br /&gt;
               suggested edits&lt;br /&gt;
    2021/06/09 updated advisory and requested CVE identifier&lt;br /&gt;
    2021/06/10 public disclosure&lt;br /&gt;
&lt;br /&gt;
Credits:&lt;br /&gt;
    Simon Bieber&lt;br /&gt;
    sbieber@secuvera.de&lt;br /&gt;
    secuvera GmbH&lt;br /&gt;
    https://www.secuvera.de&lt;br /&gt;
&lt;br /&gt;
Disclaimer:&lt;br /&gt;
     All information is provided without warranty. The intent is to&lt;br /&gt;
     provide information to secure infrastructure and/or systems, not&lt;br /&gt;
     to be able to attack or damage. Therefore secuvera shall&lt;br /&gt;
     not be liable for any direct or indirect damages that might be&lt;br /&gt;
     caused by using this information.&lt;br /&gt;
&lt;br /&gt;
This message is signed with my PGP key (Short Key ID 661263A5)&lt;br /&gt;
You can download it here:&lt;br /&gt;
https://www.secuvera.de/download/simon-bieber-short-key-id-661263a5/&lt;br /&gt;
-----BEGIN PGP SIGNATURE-----&lt;br /&gt;
&lt;br /&gt;
iQIzBAEBCAAdFiEE6mgEBCu3JYBqmGrgDIJc8mYSY6UFAmDDFocACgkQDIJc8mYS&lt;br /&gt;
Y6V1YBAAivvBI79oAYKrkkELU1drnEtIloRggLF6FQ4BlBgZ1DMfLQLcbACVT2LY&lt;br /&gt;
ro9SBpU/s6AOaZ98jETA/nS57MD+70ncEevP6hm3DzxV1mHtS4rjTU6hkcFfC8tq&lt;br /&gt;
rqeXRz4t1oWhPQd+AB2TOvpUIRtVn4zomNs9e3YkYRhRBixqZgrLz/c0mQjKIW/u&lt;br /&gt;
+hf0v5RYYSwA8q9LyhN6QUmm0UCVg06o55l8+eyc6V1JeMekdX7ais99Ki/FNmYw&lt;br /&gt;
z66aP4FrPx+RpCVsl0sCpMiZWIhNtUVq37uNJCaE55K6li241RVDLmzZtNFThx8F&lt;br /&gt;
maqdUa1wdEJ3AY8Ays/s2HWg4EkTyA1Key25NvSUVNUvYwqDgE/TzXK/rqVpIvIs&lt;br /&gt;
+dTiEJ1Q8aBlRL61UF6ddz2fliVj85q/4tQCJ/Nk062pkpI2bfhsgeEnwwkXQrTp&lt;br /&gt;
Yqln1z0R4THpWsiUQ0q3VeFFDU33T8Lch1wpURNtR1V1O+Zz4T4W+UX5Q3uIfprF&lt;br /&gt;
04TwIQIGssXFlE2RNAHrO08dct0cFpe4luF5Y8WWh4DiNitpydJfOk9G/Itfm/53&lt;br /&gt;
g9Ci5UKFB4+YvGrqMz+StypOWO3syrEzYJf2Sv/Xh1wInPDUboQ8gFev9Gzc3LG5&lt;br /&gt;
8pcflcVN2lGGYuxH3f4KdR5LmgFdYWcPDvY76B9tNWw0bPHUzU8=&lt;br /&gt;
=7Aiz&lt;br /&gt;
-----END PGP SIGNATURE-----&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>