Mitigating CVE-2024-50623: Unrestricted File Upload and Download Vulnerability in Cleo Products

December 16, 2024

Mitigating CVE-2017-1000486: Remote Code Execution Vulnerability in PrimeTek PrimeFaces

December 17, 2024

Mitigating CVE-2024-55956: Unauthenticated Command Execution via Autorun Directory in Cleo Products

by CyRisk

Tech Stack

  • Affected Products:
    • Cleo Harmony (versions prior to 5.8.0.24)
    • VLTrader (versions prior to 5.8.0.24)
    • LexiCom (versions prior to 5.8.0.24)

Date(s) Issued

  • Published: December 13, 2024
  • Updated: December 13, 2024

Criticality

  • Severity Rating: Critical
  • Potential Impact: Exploitation allows an unauthenticated attacker to import and execute arbitrary Bash or PowerShell commands on the host system, potentially resulting in full system compromise.

Overview

This vulnerability is caused by insecure default settings in the Autorun Directory of Cleo Harmony, VLTrader, and LexiCom. An unauthenticated user can exploit this flaw to import and execute arbitrary scripts (e.g., Bash or PowerShell) on the host system. Successful exploitation could lead to unauthorized system access, privilege escalation, and complete system takeover.


Solution and Mitigation Steps

1. Upgrade Affected Software

Cleo has released version 5.8.0.24 to address this critical vulnerability.
Action:

  • Immediately upgrade to version 5.8.0.24 or later for the following products:
    • Cleo Harmony
    • VLTrader
    • LexiCom
  • Download the patch and instructions from Cleo’s official site: Cleo Security Update for CVE-2024-55956.

2. Disable Autorun Directory (if upgrade is not immediately feasible)

Until the software is updated, take the following steps to mitigate the risk:

  • Disable the Autorun Directory Feature:
    • Locate the Autorun configuration in the system settings.
    • Disable or remove all files and scripts in the Autorun directory.
  • Restrict Directory Access:
    • Limit access permissions to the Autorun directory to prevent unauthorized users from modifying its contents.

3. Harden Command Execution

  • Restrict Shell Access:
    • Disable Bash and PowerShell access for unauthorized users.
    • Use restrictive policies for script execution via Group Policy Objects (GPO) or Linux security tools.
  • Log and Monitor Execution:
    • Enable logging for all script executions.
    • Use monitoring tools to detect unusual activity or unauthorized script imports.

4. Network Segmentation and Firewall Rules

  • Restrict External Access:
    • Isolate the affected systems from public-facing networks until patches are applied.
    • Block untrusted IPs from connecting to the system using firewalls or intrusion prevention systems (IPS).

5. Implement Least Privilege

  • Review user access permissions and limit privileges to prevent unauthorized users from accessing system resources.
  • Remove any unnecessary administrative accounts or privileges.

Confirmation & Additional Information

Verify Mitigation Implementation

  • Post-Upgrade: Verify that the installed version is 5.8.0.24 or higher.
    • This can be confirmed in the product’s version information in the admin console.
  • Test Mitigations:
    • Attempt to execute unauthorized scripts in a controlled testing environment to ensure protections are active.

Stay Updated

Additional Resources

Hardening Documentation for Cleo Products: Follow Cleo’s security guidelines for enhanced configuration.

Cleo Customer Support: Support Portal

Leave a Reply

Discover more from CyRisk

Subscribe now to keep reading and get access to the full archive.

Continue reading