Bitdefender warns of multiple critical vulnerabilities in the Device42 asset management platform, including bugs that could be exploited to execute arbitrary code.
Bitdefender warns of multiple critical vulnerabilities in the Device42 asset management platform, including bugs that could be exploited to execute arbitrary code.
The Device42 platform helps administrators track applications, devices, and hardware, providing them with the ability to manage data center assets, passwords, and services, as well as with device discovery and asset tagging features.
This week, Bitdefender shared information on three critical vulnerabilities in the Device42 platform and one in the Device42 ApplianceManager console, warning that attackers could exploit these to achieve remote code execution.
“By exploiting these issues, an attacker could impersonate other users, obtain admin-level access in the application (by leaking session with an LFI) or obtain full access to the appliance files and database (through remote code execution),” Bitdefender says.
The company’s security researchers discovered that, because the platform did not properly validate provided paths, it was possible to read sensitive files on the server without authentication (CVE-2022-1401).
Because the platform contained hardcoded Exago encryption keys (CVE-2022-1400), an attacker could chain the two vulnerabilities to access files containing session IDs and decrypt them, and then bypass authentication by using the session information to access the application as an authenticated user.
Bitdefender also notes that the attacker could then exploit the third vulnerability in Device42 (CVE-2022-1399) to achieve remote code execution “by creating an autodiscovery task (*nix/CISCO NX-OS) with crafted RCE payload as username.”
The researchers warn that the manipulation of ssh bash command parameters would allow the attacker to execute code with root privileges.
“By daisy-chaining multiple vulnerabilities, an attacker can achieve remote code execution with root privileges starting from an unauthenticated session,” Bitdefender warns.
The researchers also discovered a remote code execution vulnerability in the Device42 Appliance Manager console, which requires valid credentials for exploitation. Those credentials, however, could be obtained by exploiting the aforementioned security bugs.
Bitdefender reported the vulnerabilities to the Device42 team in February, which resolved all issues with the release of Device42 version 18.01.00. Customers are advised to update to the patched version as soon as possible.
By Ionut Arghire on Thu, 11 Aug 2022 12:49:02 +0000
Original link