Selea CarPlateServer (CPS) v4.0.1.6 Local Privilege Escalation

Title: Selea CarPlateServer (CPS) v4.0.1.6 Local Privilege Escalation
Advisory ID: ZSL-2021-5621
Type: Local
Impact: Privilege Escalation
Risk: (3/5)
Release Date: 21.01.2021
Our CPS (Car Plate Server) software is an advanced solution that can be installed on computers and servers and used as an operations centre. It can create sophisticated traffic control and road safety systems connecting to stationary, mobile or vehicle-installed ANPR systems. CPS allows to send alert notifications directly to tablets or smartphones, it can receive and transfer data through safe encrypted protocols (HTTPS and FTPS). CPS is an open solution that offers full integration with main video surveillance software. Our CPS software connects to the national operations centre and provides law enforcement authorities with necessary tools to issue alerts. CPS is designed to guarantee cooperation among different law enforcement agencies. It allows to create a multi-user environment that manages different hierarchy levels and the related division of competences.
The application suffers from an unquoted search path issue impacting the service 'Selea CarPlateServer' for Windows deployed as part of Selea CPS software application. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.
Selea s.r.l. -
Affected Version
Tested On
Microsoft Windows 10 Enterprise
Vendor Status
[07.11.2020] Vulnerability discovered.
[09.11.2020] Vendor contacted.
[09.11.2020] Vendor responds asking for explanation.
[09.11.2020] Asked vendor for security personnel and explained about security submissions and risk/impact.
[10.11.2020] Vendor responds asking for details.
[11.11.2020] Sent details to the vendor (high-level, asked for PGP).
[14.11.2020] Asked vendor for status update.
[18.11.2020] Vendor responds: We already reviewed and fixed most of the vulnerabilities you described in newer version of both camera firmware and the CarPlateServer software.
[19.11.2020] Replied to the vendor.
[20.11.2020] Vendor will get back to us.
[06.12.2020] Asked vendor for status update.
[09.12.2020] Vendor in final test phase for new releases. Estimated release date: End of year.
[09.12.2020] Replied to the vendor.
[17.01.2021] Asked vendor for status update.
[20.01.2021] No response from the vendor.
[21.01.2021] Public security advisory released.
Vulnerability discovered by Gjoko Krstic - <>
[21.01.2021] - Initial release
[26.01.2021] - Added reference [1], [2] and [3]
Zero Science Lab