Exploit released for new Arcserve UDP auth bypass vulnerability

3 tháng 7, 2023

Data protection vendor Arcserve has addressed a high-severity security flaw in its Unified Data Protection (UDP) backup software that can let attackers bypass authentication and gain admin privileges.


According to the company, Arcserve UDP is a data and ransomware protection solution designed to help customers thwart ransomware attacks, restore compromised data, and enable effective disaster recovery to ensure business continuity.


Arcserve released UDP 9.1 to fix the vulnerability (tracked as CVE-2023-26258) on June 27, four months after the bug was found and reported by security researchers Juan Manuel Fernandez and Sean Doherty with MDSec's ActiveBreach red team.


"During a recent adversary simulation, the MDSec ActiveBreach red team [was] performing a ransomware scenario, with a key objective set on compromising the organization's backup infrastructure," the researchers said.


"Within minutes of analysing the code, a critical authentication bypass was discovered that allowed access to the administration interface."



On systems running Arcserve UDP 7.0 up to 9.0, the flaw enables attackers on the local network to access the UDP admin interface after obtaining easy-to-decrypt admin credentials by capturing SOAP requests containing AuthUUIDs to get valid administrator sessions.


"We strongly recommend all the users upgrade to UDP 9.1 (Windows) – which can be done via built-in auto-update in UDP version 9 or using the 9.1 RTM build for fresh deployments and old versions," Arcserve said.


The admin credentials could allow threat actors to destroy the targets' data by wiping the backups in ransomware attacks.


The MDSec ActiveBreach researchers added that a pair of default MSSQL database credentials could also be used to obtain the admin credentials if the targeted server is already patched against CVE-2023-26258 and uses a default config.


MDSec also shared proof-of-concept exploits and tools that can be used to scan for Arcserve UDP instances with default configuration on local networks, as well as retrieve and decrypt credentials by exploiting the authentication bypass in the management interface.


"If the attacker is positioned on the local network, scans can be performed to find instances using default configurations using ArcServeRadar.py," MDSec explains.


"Finally, if the ArcServe version was not patched (CVE-2023-26258) it is possible to exploit an authentication bypass in the management web interface and retrieve the admin creds (ArcServe-exploit.py). All the passwords retrieved by the tools can be decrypted using ArcServeDecrypter.exe."


While MDsec exchanged more than a dozen messages with the Arcserve team during the disclosure process and was asked how they wanted to be credited, the final line in the disclosure timeline shared at the end of the report says, "ArcServe releases the patch without credits."


Arcserve says its data protection products help safeguard the data of roughly 235,000 customers across 150 countries.




Source: bleepingcomputer.com


Bạn cũng có thể quan tâm

4 tháng 6, 2024
Bộ định tuyến chơi game TP-Link Archer C5400X dễ mắc phải các lỗi bảo mật có thể cho phép kẻ tấn công từ xa, không được xác thực thực thi các lệnh trên thiết bị.
3 tháng 6, 2024
Ngày 27 tháng 5 Check Point đã cảnh báo rằng các tác nhân đe dọa đang nhắm mục tiêu vào các thiết bị VPN truy cập từ xa của Check Point trong một chiến dịch đang diễn ra nhằm xâm phạm mạng doanh nghiệp.
31 tháng 5, 2024
Công ty quản lý đơn thuốc Sav-Rx cảnh báo hơn 2,8 triệu cá nhân ở Hoa Kỳ việc họ đã bị vi phạm dữ liệu và dữ liệu cá nhân của họ đã bị đánh cắp trong một cuộc tấn công mạng năm 2023.
Thêm bài viết
Share by: