CVE-2017-18362 Scanner
CVE-2017-18362 Scanner - Remote Code Execution vulnerability in Kaseya VSA ConnectWise ManagedITSync
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
9 days 21 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
The Kaseya VSA ConnectWise ManagedITSync is a widely utilized integration tool used by IT service management and managed service providers to synchronize data between Kaseya VSA and ConnectWise. This software is primarily used to enhance functionalities, streamline operations, and manage extensive IT infrastructures effectively. IT professionals and organizations leverage this integration to automate tasks, process incidents, synchronize configuration items, and ensure seamless accountability in service delivery. It is designed to improve operational efficiencies, reduce manual efforts, and enhance the overall service delivery quality for managed services. The integration also provides extensive reporting capabilities, thus allowing for better tracking and insights into infrastructure management.
Remote Code Execution (RCE) vulnerability allows an attacker to remotely execute arbitrary code on a target system or network. In this specific case with Kaseya VSA ConnectWise ManagedITSync, the vulnerability was associated with unauthenticated remote commands on the managed interface. This indicates a potential path for attackers to execute unwanted commands, manipulate database entries, or even deploy malicious payloads. As RCE is critical in nature, attackers gaining such access could lead to severe impacts including unauthorized access to sensitive data, full control of systems, and potential lateral movement within a network.
The vulnerability in question is notably linked to how the ManagedIT.asmx page of ConnectWise ManagedITSync handles SQL queries. With the vulnerability discovered in the 2017 version of Kaseya VSA, attackers were able to exploit unauthenticated remote commands to run arbitrary SQL queries. The problematic endpoint, ManagedIT.asmx, when exposed, could be accessed by anyone who could then issue SQL commands without authentication, making both read and write database operations vulnerable. This indicates poor input validation and inadequate security measures on key web service pages exposed through the Kaseya interface.
When exploited by malicious actors, this vulnerability can have dire consequences for any organization using Kaseya VSA. Possible effects include unauthorized access to the database with capabilities to read, alter, or delete data. This could lead to significant data breaches, data loss, and corruption of organizational data, undermining business operations and data integrity. Additionally, in practice, it was noted that attackers could use this vulnerability as an entry point for deploying ransomware payloads, causing significant operational and reputational damage, and potential financial loss through ransom payments.
REFERENCES