Japan
サイト内の現在位置
Multiple vulnerabilities in EXPRESSCLUSTER X
Number:NV23-009
CVE:CVE-2023-39544, CVE-2023-39545, CVE-2023-39546, CVE-2023-39547, CVE-2023-39548
Overview
EXPRESSCLUSTER X WebManager/Cluster WebUI contains multiple vulnerabilities.
Missing Authorization(CVE-2023-39544)
Files or Directories Accessible to External Parties(CVE-2023-39545)
Authentication Bypass(CVE-2023-39546)
Improper Authentication(CVE-2023-39547)
Unrestricted Upload of File with Dangerous Type(CVE-2023-39548)
Products Affected
EXPRESSCLUSTER X
Affected Version
EXPRESSCLUSTER X 1.0 for Windows
EXPRESSCLUSTER X 2.0 for Windows
EXPRESSCLUSTER X 2.1 for Windows
EXPRESSCLUSTER X 3.0 for Windows
EXPRESSCLUSTER X 3.1 for Windows
EXPRESSCLUSTER X 3.2 for Windows
EXPRESSCLUSTER X 3.3 for Windows
EXPRESSCLUSTER X 4.0 for Windows
EXPRESSCLUSTER X 4.1 for Windows
EXPRESSCLUSTER X 4.2 for Windows
EXPRESSCLUSTER X 4.3 for Windows
EXPRESSCLUSTER X 5.0 for Windows
EXPRESSCLUSTER X 5.1 for Windows
EXPRESSCLUSTER X SingleServerSafe 1.0 for Windows
EXPRESSCLUSTER X SingleServerSafe 2.0 for Windows
EXPRESSCLUSTER X SingleServerSafe 2.1 for Windows
EXPRESSCLUSTER X SingleServerSafe 3.0 for Windows
EXPRESSCLUSTER X SingleServerSafe 3.1 for Windows
EXPRESSCLUSTER X SingleServerSafe 3.2 for Windows
EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows
EXPRESSCLUSTER X SingleServerSafe 4.0 for Windows
EXPRESSCLUSTER X SingleServerSafe 4.1 for Windows
EXPRESSCLUSTER X SingleServerSafe 4.2 for Windows
EXPRESSCLUSTER X SingleServerSafe 4.3 for Windows
EXPRESSCLUSTER X SingleServerSafe 5.0 for Windows
EXPRESSCLUSTER X SingleServerSafe 5.1 for Windows
EXPRESSCLUSTER X 1.0 for Linux
EXPRESSCLUSTER X 2.0 for Linux
EXPRESSCLUSTER X 2.1 for Linux
EXPRESSCLUSTER X 3.0 for Linux
EXPRESSCLUSTER X 3.1 for Linux
EXPRESSCLUSTER X 3.2 for Linux
EXPRESSCLUSTER X 3.3 for Linux
EXPRESSCLUSTER X 4.0 for Linux
EXPRESSCLUSTER X 4.1 for Linux
EXPRESSCLUSTER X 4.2 for Linux
EXPRESSCLUSTER X 4.3 for Linux
EXPRESSCLUSTER X 5.0 for Linux
EXPRESSCLUSTER X 5.1 for Linux
EXPRESSCLUSTER X 1.0 SingleServerSafe for Linux
EXPRESSCLUSTER X 2.0 SingleServerSafe for Linux
EXPRESSCLUSTER X 2.1 SingleServerSafe for Linux
EXPRESSCLUSTER X 3.0 SingleServerSafe for Linux
EXPRESSCLUSTER X 3.1 SingleServerSafe for Linux
EXPRESSCLUSTER X 3.2 SingleServerSafe for Linux
EXPRESSCLUSTER X 3.3 SingleServerSafe for Linux
EXPRESSCLUSTER X 4.0 SingleServerSafe for Linux
EXPRESSCLUSTER X 4.1 SingleServerSafe for Linux
EXPRESSCLUSTER X 4.2 SingleServerSafe for Linux
EXPRESSCLUSTER X 4.3 SingleServerSafe for Linux
EXPRESSCLUSTER X 5.0 SingleServerSafe for Linux
EXPRESSCLUSTER X 5.1 SingleServerSafe for Linux
Solution
■Please refer the folloing web pages and apply the patch.
* In order to see the following web page and download the patches, it is required to login to NEC Support Portal.
Update for EXPRESSCLUSTER X 5.0/5.1 for Windows (Internal version 13.00 - 13.11):
[EXPRESSCLUSTER X 5.0/5.1 for Windows update release (CPRO-XW050-05E)] (https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=9510100482 )
[EXPRESSCLUSTER X SingleServerSafe 5.0/5.1 for Windows update release (CPRO-XW450-05E)] (
https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=9510100483 )
Additional update for EXPRESSCLUSTER X 4.3 for Windows (Internal version 12.30 - 12.34):
[EXPRESSCLUSTER X 4.3 for Windows Additional Update] (
https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=4140100125 )
[EXPRESSCLUSTER X SingleServerSafe 4.3 for Windows Additional Update] (
https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=4140100126 )
Additional update for EXPRESSCLUSTER X 3.3 for Windows (Internal version 11.35):
[EXPRESSCLUSTER X 3.3 for Windows Additional Update] (
https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=4140100127 )
[EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows Additional Update] (
https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=4140100128 )
Update for EXPRESSCLUSTER X 5.0/5.1 for Linux (Internal version 5.0.0-1 - 5.1.1-1):
[EXPRESSCLUSTER X 5.0/5.1 for Linux update CPRO-XL080-05E] (
https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=9510100484 )
[EXPRESSCLUSTER X SingleServerSafe 5.0/5.1 for Linux update CPRO-XL450-05E] (
https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=9510100485 )
Additional update for EXPRESSCLUSTER X 4.3 for Linux (Internal version 4.3.0-1 - 4.3.4-1):
[EXPRESSCLUSTER X 4.3 for Linux Additional Update] (
https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=4140100135 )
[EXPRESSCLUSTER X SingleServerSafe 4.3 for Linux Additional Update] (
https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=4140100136 )
Additional update for EXPRESSCLUSTER X 3.3 for Linux (Internal version 3.3.5-1):
[EXPRESSCLUSTER X 3.3 for Linux Additional Update] (
https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=4140100133 )
[EXPRESSCLUSTER X SingleServerSafe 3.3 for Linux Additional Update] (
https://www.support.nec.co.jp/en/View.aspx?NoClear=on&id=4140100134 )
■Apply a Workaround
Please block communication to the WebManager service.
- Disable [Enable WebManager Service] of WebUI/WebManager.
If you can't block it, please enable the firewall and block unnecessary communication.
- For the following ports, allow only management client to accept connection requests.
- WebManager HTTP port (default: 29003)
- Set HTTPS (after X 4.0)
References
CVE-2023-39544
https://www.cve.org/CVERecord?id=CVE-2023-39544
CVE-2023-39545
https://www.cve.org/CVERecord?id=CVE-2023-39545
CVE-2023-39546
https://www.cve.org/CVERecord?id=CVE-2023-39546
CVE-2023-39547
https://www.cve.org/CVERecord?id=CVE-2023-39547
CVE-2023-39548
https://www.cve.org/CVERecord?id=CVE-2023-39548
Credit
reported by Mr. David Levard in Videotron for NEC-PSIRT
Update
- 2023/11/27
-
Update Solution.
- 2023/11/17
-
First edition