Remote code execution in DrayTek VigorACS



Published: 2018-04-20
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-5641
CWE-ID CWE-502
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
VigorACS 2
Server applications / Remote management servers, RDP, SSH

Vendor DrayTek Corp.

Security Bulletin

This security bulletin contains information about 1 vulnerabilities.

The vulnerability is present in an exposed "/ACSServer/messabroker/amf" endpoint.

1) Deserializatoin of untrusted data

EUVDB-ID: #VU6303

Risk: High

CVSSv3.1: 9.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]

CVE-ID: CVE-2017-5641

CWE-ID: CWE-502 - Deserialization of Untrusted Data

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the use of BlazeDS to process AMF3 messages within Customer Experience Improvement Program (CEIP) functionality. A remote attacker can execute arbitrary code on the target system when deserializing an untrusted Java object.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update to version 2.2.2.

Vulnerable software versions

VigorACS 2: 2.1.0 - 2.2.1

External links

http://blogs.securiteam.com/index.php/archives/3681
http://github.com/pedrib/PoC/blob/master/exploits/acsPwn/acsPwn.rb


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



###SIDEBAR###