hartescout (9)

Last Login: July 06, 2020

hartescout's Contributions (7)

Sort by:
Filter by:

I wholeheartedly disagree with you. Our job is to check the vendors. If we were misled by a researcher who made a mistake, that happens. Furthermore if you figured this out it’s on you to present your findings in a more professional manner than what I’ve just read.

Todb-r7… Come on. This is not Reddit. Be better than your latest edit. We’re here to discuss, not act like idiots because we are embarrassed by a mistake. Be a leader not someone that needs a new hobby. I hope to see something better than his in the future my friend. I know you can do it


If there are already cases of exploitation, then it is already for sale and or available on the dirtball web. If the code is injected, which is becoming more and more prevalent. Whenever I see RCE I think serious. RCE is gold, no matter how difficult it is to reproduce. If the target is worth it, someone will hit it, and probably be paid to do it. Remember the Saudi Prince “hacking” Bezos? Iphones are used by many with the illusion they are safer than the rest.

It will be interesting to see how this plays out. I’m looking forward to more expert analysis, my opinion is just from experience. I have not had a chance to get into this exploit.

  • Attacker Value
  • Exploitability
Technical Analysis

” Multiple ZyXEL devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to properly sanitize the username parameter that is passed to it. If the username parameter contains certain characters, it can allow command injection with the privileges of the web server that runs on the ZyXEL device. Although the web server does not run as the root user, many ZyXEL devices include a setuid utility that can be leveraged to run any command with root privileges. As such, it should be assumed that exploitation of this vulnerability can lead to remote code execution with root privileges.

Exploit code for this vulnerability that targets NAS devices is available on the internet. “

Exploits are available. What interests me is this shodan.io search posted with 138,000+ devices still vulnerable. A firmware update has been released for most versions of device however, ” Block access to the ZyXEL device web interface “ is the advice for remaining or an alternative.
Here is the shodan search I put in as a reference for the topic as well. Again, you’re expert opinion is much more valuable than mine at this early stage. I am unfortunately unable to test these in my lab environment due to other commitments.

edit: I might be mistaken CVE-2020-9054 is listed as the exploit here: https://kb.cert.org/artifacts/cve-2020-9054.html



I’ll be using your TA format the next time I post an analysis. Appreciate the example.


If that’s the case then I should not have marked the patching as difficult. I need to look into this more tomorrow if possible. Thanks for the heads up, please let us know what you find!

Technical Analysis

This one is fairly new. I will put a few quotes in here as they display my ideas of why this should be considered high priority and have better writing skills than I do, unfortunately.
I was initially alerted (again) to this CVE with the Thread linked here : https://twitter.com/GossiTheDog/status/1232368620270911488
I agree, enterprise environments with Internet facing Exchange. As stated in the thread, you can see a simple search with shodan.io will expose this vulnerability. There are thousands that qualify.

Here is another, more formal and thorough analysis I think you will find helpful: https://www.thezdi.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys

Here is a video of bug in action.

This is a RCE vulnerability that effects Microsoft Exchange Server. Now a patch was released, but Microsoft has not classified this as critical, so we will see how effective it is.

“Instead of having randomly-generated keys on a per-installation basis, all installations of Microsoft Exchange Server have the same validationKey and decryptionKey values in web.config. These keys are used to provide security for ViewState. ViewState is server-side data that ASP.NET web applications store in serialized format on the client. The client provides this data back to the server via the __VIEWSTATE request parameter. “

I welcome any discussion, please tell me if I missing something. I would love to hear more about this and if any Blue Team has had an incident already.
Take care!