The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-29080

CVE-2023-29080: InstallShield Privilege Escalation Flaw

CVE-2023-29080 is a privilege escalation vulnerability in Revenera InstallShield 2022 R2 and 2021 R2 caused by DLL hijacking during installation. This article covers technical details, affected versions, and mitigation.

Published: February 4, 2026

CVE-2023-29080 Overview

CVE-2023-29080 is a privilege escalation vulnerability affecting Revenera InstallShield versions 2022 R2 and 2021 R2. The vulnerability arises when adding an InstallScript custom action to a Basic MSI or InstallScript MSI project, which extracts binaries to a predefined writable folder during installation time. Because standard user accounts have write access to these files and folders, an attacker can replace them during installation to achieve DLL hijacking, potentially leading to privilege escalation.

Critical Impact

Local attackers with standard user privileges can exploit this vulnerability to escalate privileges by hijacking DLL files during software installation, potentially gaining elevated system access.

Affected Products

  • Revenera InstallShield 2022 R2
  • Revenera InstallShield 2021 R2
  • Software packages built using affected InstallShield versions

Discovery Timeline

  • 2025-01-30 - CVE CVE-2023-29080 published to NVD
  • 2025-01-30 - Last updated in NVD database

Technical Details for CVE-2023-29080

Vulnerability Analysis

This vulnerability is classified under CWE-552 (Files or Directories Accessible to External Parties). The core issue stems from improper file permission handling during InstallShield-based software installations.

When an InstallScript custom action is added to a Basic MSI or InstallScript MSI project, the installation process extracts certain binary files to a predefined folder. The critical flaw is that this folder is writable by standard (non-privileged) user accounts on the system. This creates a race condition scenario where an attacker can monitor for installation activity and replace legitimate binaries with malicious ones before they are executed with elevated privileges.

The DLL hijacking attack leverages the Windows DLL search order mechanism. When the installer or the installed application loads a DLL, it searches predefined directories in a specific order. By placing a malicious DLL in the writable folder before the legitimate DLL is loaded, an attacker can intercept the DLL loading process and execute arbitrary code with the privileges of the installation process—typically SYSTEM or Administrator level.

Root Cause

The root cause of this vulnerability is the insecure file system permissions applied to the temporary extraction folder used during InstallShield installations. The installer extracts binary files to a location where standard users have write permissions, violating the principle of least privilege. Combined with the elevated privileges typically required for software installation, this creates a privilege escalation vector through DLL hijacking.

Attack Vector

The attack requires local access to the target system with standard user privileges. An attacker would need to:

  1. Identify when an InstallShield-based installation is occurring on the system
  2. Locate the predefined writable folder where binaries are extracted
  3. Replace legitimate DLL files with malicious versions before they are loaded
  4. Wait for the installation process to load the hijacked DLL with elevated privileges

The vulnerability exploits the Time-of-Check Time-of-Use (TOCTOU) window between file extraction and file loading, combined with the overly permissive file system ACLs on the extraction directory.

Detection Methods for CVE-2023-29080

Indicators of Compromise

  • Unexpected DLL files appearing in InstallShield temporary extraction directories
  • File modification timestamps that predate the installation start time on extracted binaries
  • Hash mismatches between extracted DLLs and known-good installer components
  • Unusual process trees showing msiexec.exe or InstallShield processes loading DLLs from unexpected locations

Detection Strategies

  • Monitor file system activity in common InstallShield extraction paths (e.g., %TEMP%, %APPDATA%, and custom extraction directories) for rapid file replacement patterns
  • Implement application whitelisting to prevent unauthorized DLLs from being loaded by installer processes
  • Deploy endpoint detection rules that alert on DLL loads from writable user directories by elevated processes
  • Use SentinelOne's behavioral AI to detect anomalous DLL loading patterns during software installation workflows

Monitoring Recommendations

  • Enable detailed file system auditing on known InstallShield extraction directories
  • Configure alerts for privilege escalation attempts correlating with software installation events
  • Implement integrity monitoring on systems where InstallShield-based installations are expected
  • Review installation logs for evidence of DLL loading failures or unexpected library paths

How to Mitigate CVE-2023-29080

Immediate Actions Required

  • Apply the security patch provided by Revenera for InstallShield 2022 R2 and 2021 R2
  • Review and audit existing InstallShield projects that use InstallScript custom actions
  • Implement application control policies to restrict DLL loading during installation processes
  • Consider temporarily suspending deployments of affected installer packages until patched versions are available

Patch Information

Revenera has released a security patch addressing this vulnerability. The patch modifies the file extraction behavior to use secure directories with appropriate access controls during installation. Administrators should obtain the patch from the Revenera Security Patch Advisory and apply it to all InstallShield development environments. After patching, all affected installer projects should be rebuilt to incorporate the security fixes.

Workarounds

  • Manually modify extraction directory permissions to restrict standard user write access during installation
  • Implement Windows Defender Application Control (WDAC) policies to enforce DLL code signing requirements
  • Use process monitoring tools to detect and block unauthorized DLL replacements during installation
  • Consider running installations in isolated environments where standard users cannot access the extraction directories

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechRevenera Installshield

  • SeverityHIGH

  • CVSS Score8.5

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-552
  • Technical References
  • Revenera Security Patch Advisory
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English