Attacker Value
Very High
(1 user assessed)
Exploitability
Very Low
(1 user assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
3

CVE-2023-2989

Disclosure Date: June 22, 2023
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Fortra Globalscape EFT versions before 8.1.0.16 suffer from an out of bounds memory read in their administration server, which can allow an attacker to crash the service or bypass authentication if successfully exploited

Add Assessment

1
Ratings
Technical Analysis

At its core, this is a blind out of bounds memory read in the packet parser for the Fortra Globalscape admin server. That means that you can trick the packet parser into leaving the memory bounds of its packet and processing other memory as if it was part of the packet. The most likely result is sending the parser into unallocated memory and crashing the process.

However, if an attacker can correctly guess the offset of another user’s login packet (which isn’t as crazy as it sounds – packets are typically close together on the heap), they can use the other user’s login and bypass authentication altogether.

Without some sorta heap massaging or very lucky guessing, this is going to be very difficult to exploit, but it’s definitely interesting!

Simple PoC

CVSS V3 Severity and Metrics
Base Score:
9.1 Critical
Impact Score:
5.2
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • globalscape

Products

  • eft server

Additional Info

Technical Analysis