Headline
CVE-2022-35866: ZDI-22-959
This vulnerability allows remote attackers to bypass authentication on affected installations of Vinchin Backup and Recovery 6.5.0.17561. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the MySQL server. The server uses a hard-coded password for the administrator user. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-17139.
July 8th, 2022
(0Day) Vinchin Backup and Recovery MySQL Server Use of Hard-coded Credentials Authentication Bypass Vulnerability****ZDI-22-959
ZDI-CAN-17139
CVE ID
CVE-2022-35866
CVSS SCORE
9.8, (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
AFFECTED VENDORS
Vinchin
AFFECTED PRODUCTS
Backup and Recovery
VULNERABILITY DETAILS
This vulnerability allows remote attackers to bypass authentication on affected installations of Vinchin Backup and Recovery. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the configuration of the MySQL server. The server uses a hard-coded password for the administrator user. An attacker can leverage this vulnerability to bypass authentication on the system.
ADDITIONAL DETAILS
This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120-day deadline.
04/29/22 – ZDI attempted to contact the vendor PSIRT and obtain secure keys via the contact information on their website as well as using the chat support feature.
05/17/22 – ZDI made another attempt to contact the vendor with no response back.
05/25/22 – ZDI made one final attempt to contact the vendor’s key leadership.
06/30/22 – ZDI confirmed that this vulnerability is still exploitable and has not been patched.
07/01/22 – ZDI notified the vendor of the intention to publish the case as 0-day advisory on 07/8/22
– Mitigation:
Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application.
DISCLOSURE TIMELINE
- 2022-07-08 - Vulnerability reported to vendor
- 2022-07-08 - Coordinated public release of advisory
- 2022-07-14 - Advisory Updated
CREDIT
Esjay
BACK TO ADVISORIES
Related news
A critical security issue has been discovered in Vinchin Backup and Recovery version 7.2. The software has been found to use default MYSQL credentials, which could lead to significant security risks.
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.