Advisory Details

February 10th, 2015

(0Day) Persistent Systems Client Automation Command Injection Remote Code Execution Vulnerability

ZDI-15-038
ZDI-CAN-2142

CVE ID CVE-2015-1497
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Persistent Systems
AFFECTED PRODUCTS Radia Client Automation
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['13720']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Persistent Systems Client Automation. Authentication is not required to exploit this vulnerability.

The flaw exists within the radexecd.exe component which listens by default on TCP port 3465. When handling a remote execution request the process does not properly authenticate the user issuing the request. The command to be executed is also not properly sanitized. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of SYSTEM.

This vulnerability is different than ZDI-11-105.

ADDITIONAL DETAILS Persistent Systems has issued an update to correct this vulnerability. More details can be found at:
https://radiasupport.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features
DISCLOSURE TIMELINE
  • 2014-04-16 - Vulnerability reported to vendor
  • 2015-02-10 - Coordinated public release of advisory
CREDIT Ben Turner
BACK TO ADVISORIES