CVE-2020-37129
MEmu · MEmu Play
MEmu Play 7.1.3 contains an insecure folder permissions vulnerability allowing low-privileged users to replace the MemuService.exe file and gain SYSTEM-level privileges upon system restart.
Executive summary
MEmu Play 7.1.3 contains an insecure folder permissions flaw allowing low-privileged users to gain full SYSTEM-level access by replacing a critical service executable.
Vulnerability
The application utilizes insecure file system permissions on its installation directory, specifically allowing low-privileged authenticated users to modify the MemuService.exe file. By replacing this executable with a malicious binary, an attacker can achieve local privilege escalation to SYSTEM level when the service restarts.
Business impact
This vulnerability represents a significant internal threat, as it allows any user with basic access to the machine to gain total control over the operating system. Such an escalation can be used to disable security software, steal sensitive local data, or pivot further into the corporate network. The CVSS score of 9.8 underscores the critical impact of a local user gaining full administrative control.
Remediation
Immediate Action: Update MEmu Play to the latest version, which addresses the directory permission issues, and verify that the "Everyone" or "Users" groups do not have write access to the installation folder.
Proactive Monitoring: Review system logs for unauthorized modifications to service executables and monitor for unexpected service restarts or new SYSTEM-level processes.
Compensating Controls: Utilize Endpoint Detection and Response (EDR) tools to block unauthorized file modifications in the Program Files directory and enforce the principle of least privilege.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations using MEmu Play must address this vulnerability immediately to prevent internal privilege escalation. We recommend auditing all third-party software installation directories for similar permission flaws. Applying the latest vendor patch is the most effective method to secure the service executable and maintain system integrity.