Critical Flaws Disclosed in Device42 IT Asset Management Software

2 years ago 188
BOOK THIS SPACE FOR AD
ARTICLE AD

Device42 IT Asset Management Software

Cybersecurity researchers have disclosed multiple severe security vulnerabilities asset management platform Device42 that, if successfully exploited, could enable a malicious actor to seize control of affected systems.

"By exploiting these issues, an attacker could impersonate other users, obtain admin-level access in the application (by leaking session with an LFI) or obtain full access to the appliance files and database (through remote code execution)," Bitdefender said in a Wednesday report.

CyberSecurity

Even more concerningly, an adversary with any level of access within the host network could daisy-chain three of the flaws to bypass authentication protections and achieve remote code execution with the highest privileges.

Device42 IT Asset Management Software

The issues in question are listed below -

CVE-2022-1399 - Remote Code Execution in scheduled tasks component CVE-2022-1400 - Hard-coded encryption key IV in Exago WebReportsApi.dll CVE 2022-1401 - Insufficient validation of provided paths in Exago CVE-2022-1410 - Remote Code Execution in ApplianceManager console

Device42 IT Asset Management Software

The most critical of the weaknesses is CVE-2022-1399, which makes it possible to execute bash instructions through command injection and with root permissions, granting the attacker full control over the underlying appliance.

CyberSecurity

Although remote code execution cannot be achieved by itself, it can be stringed together with CVE 2022-1401 and CVE-2022-1400 to extract valid session identifiers of already authenticated users by taking advantage of a local file inclusion vulnerability discovered in the Exago reporting component.

Following responsible disclosure by the Romanian cybersecurity firm on February 18, the flaws were addressed by Device42 in version 18.01.00 released on July 7, 2022.


Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

Read Entire Article