CVE-2026-44406 Overview
CVE-2026-44406 is a DLL hijacking vulnerability [CWE-427] in the ZTE Cloud PC client uSmartView. The flaw resides in uSmartViewServiceAgent.exe, which runs with SYSTEM privileges on Windows hosts. A local attacker who can place a malicious dynamic-link library in a directory searched by the service can trigger arbitrary code execution at the highest local privilege level. Successful exploitation leads to local code execution, privilege escalation from a standard user to SYSTEM, and memory corruption within the affected process.
Critical Impact
Local attackers can escalate to SYSTEM privileges and execute arbitrary code on hosts running the ZTE Cloud PC uSmartView client.
Affected Products
- ZTE Cloud PC client uSmartView
- uSmartViewServiceAgent.exe service component
- Windows endpoints running the vulnerable client
Discovery Timeline
- 2026-05-07 - CVE-2026-44406 published to NVD
- 2026-05-07 - Last updated in NVD database
Technical Details for CVE-2026-44406
Vulnerability Analysis
The vulnerability stems from insecure library loading in the ZTE Cloud PC uSmartView client. The uSmartViewServiceAgent.exe process loads one or more DLLs without specifying a fully qualified path or without validating the loaded module. Windows then resolves the module name through its default search order, which includes directories writable by non-privileged users in some configurations.
Because the agent runs as SYSTEM, any DLL it loads inherits SYSTEM privileges. A standard user who can drop a crafted DLL into a directory that precedes the legitimate library in the search order will have that code executed in the context of the privileged service. The advisory also notes resulting memory corruption, indicating the loaded DLL can disrupt the service's address space.
Root Cause
The root cause is uncontrolled search path element handling [CWE-427]. The application does not pin DLL loads to a trusted absolute path, does not enforce code signing on loaded modules, and does not call SetDefaultDllDirectories or use LOAD_LIBRARY_SEARCH_SYSTEM32 flags to constrain the search order.
Attack Vector
Exploitation requires local access to a host running the vulnerable client. The attacker writes a malicious DLL named after a library that uSmartViewServiceAgent.exe loads. The DLL is placed in a writable directory that Windows searches before the legitimate location. When the service starts, restarts, or otherwise triggers the load, the malicious DLL executes as SYSTEM. No user interaction beyond normal client usage is required, and no prior privileges beyond a local user account are needed.
No public exploit code is referenced in the advisory. Technical details are described in prose; see the ZTE Security Bulletin for vendor information.
Detection Methods for CVE-2026-44406
Indicators of Compromise
- Unsigned or unexpected DLL files located in the installation directory of the ZTE Cloud PC uSmartView client or in user-writable directories on the PATH.
- uSmartViewServiceAgent.exe loading modules from non-standard paths such as user profile, Downloads, or temporary directories.
- New child processes spawned by uSmartViewServiceAgent.exe running as NT AUTHORITY\SYSTEM.
Detection Strategies
- Monitor Windows Sysmon Event ID 7 (Image Loaded) for uSmartViewServiceAgent.exe and alert on DLLs that are unsigned or located outside the trusted install path.
- Hunt for file-write events that drop DLLs into directories adjacent to the uSmartView binaries, especially when the writing process is not an installer or update service.
- Correlate service start events with subsequent loads of newly created DLLs to identify hijack attempts.
Monitoring Recommendations
- Baseline the legitimate set of DLLs loaded by uSmartViewServiceAgent.exe and alert on deviations.
- Track creation of executable content in any directory writable by non-administrative users on systems running the client.
- Forward endpoint telemetry to a centralized analytics platform to detect privilege escalation chains across the fleet.
How to Mitigate CVE-2026-44406
Immediate Actions Required
- Identify all hosts with the ZTE Cloud PC uSmartView client installed and prioritize patching according to the vendor bulletin.
- Restrict write permissions on the uSmartView installation directory and on any directory present in the system or service PATH.
- Enforce application allowlisting to block execution of unsigned DLLs by privileged services.
Patch Information
Refer to the ZTE Security Bulletin for the fixed version of uSmartView. Apply the vendor-supplied update on all affected Windows endpoints. After upgrading, verify that uSmartViewServiceAgent.exe loads only signed libraries from the trusted installation path.
Workarounds
- Remove or stop the uSmartViewServiceAgent service on hosts that do not require Cloud PC connectivity until the patch is applied.
- Apply NTFS access control lists that prevent non-administrators from writing to directories searched by the service.
- Configure Windows Defender Application Control or AppLocker policies to block unsigned DLL loads by uSmartViewServiceAgent.exe.
# Restrict write access to the uSmartView install directory (run as Administrator)
icacls "C:\Program Files\ZTE\uSmartView" /inheritance:r
icacls "C:\Program Files\ZTE\uSmartView" /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "Users:(OI)(CI)RX"
# Stop and disable the service until patched
sc stop uSmartViewServiceAgent
sc config uSmartViewServiceAgent start= disabled
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


