Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-35866: ZDI-22-959

This vulnerability allows remote attackers to bypass authentication on affected installations of Vinchin Backup and Recovery 6.5.0.17561. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the MySQL server. The server uses a hard-coded password for the administrator user. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-17139.

CVE
#sql#vulnerability#web#hard_coded_credentials#auth

July 8th, 2022

(0Day) Vinchin Backup and Recovery MySQL Server Use of Hard-coded Credentials Authentication Bypass Vulnerability****ZDI-22-959
ZDI-CAN-17139

CVE ID

CVE-2022-35866

CVSS SCORE

9.8, (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

AFFECTED VENDORS

Vinchin

AFFECTED PRODUCTS

Backup and Recovery

VULNERABILITY DETAILS

This vulnerability allows remote attackers to bypass authentication on affected installations of Vinchin Backup and Recovery. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the configuration of the MySQL server. The server uses a hard-coded password for the administrator user. An attacker can leverage this vulnerability to bypass authentication on the system.

ADDITIONAL DETAILS

This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120-day deadline.

04/29/22 – ZDI attempted to contact the vendor PSIRT and obtain secure keys via the contact information on their website as well as using the chat support feature.
05/17/22 – ZDI made another attempt to contact the vendor with no response back.
05/25/22 – ZDI made one final attempt to contact the vendor’s key leadership.
06/30/22 –  ZDI confirmed that this vulnerability is still exploitable and has not been patched.
07/01/22 –  ZDI notified the vendor of the intention to publish the case as 0-day advisory on 07/8/22

– Mitigation:
Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application.

DISCLOSURE TIMELINE

  • 2022-07-08 - Vulnerability reported to vendor
  • 2022-07-08 - Coordinated public release of advisory
  • 2022-07-14 - Advisory Updated

CREDIT

Esjay

BACK TO ADVISORIES

Related news

Vinchin Backup And Recovery 7.2 Default MySQL Credentials

A critical security issue has been discovered in Vinchin Backup and Recovery version 7.2. The software has been found to use default MYSQL credentials, which could lead to significant security risks.

CVE-2022-38108: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-36957: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907