Some users may be experiencing issues when trying to access customer resources like the Case Portal or the Product Licensing Center. Our team is aware of the issue and is working to resolve it. Click here for more information.
A vulnerability which may allow unauthenticated execution of arbitrary code, depending on system configuration, has been identified in the User Console. Specifically, this issue arises from the Data Platform's use of the .NET Remoting framework.
The vulnerability is related to a TCP Remoting Channel running on port 8084 of the User Console server. The TCP Remoting Channel facilitates configuration and management from the Data Platform Admin Console. In User Console versions below 5.5.68, if SecurityMode=1 has not been enabled, unauthenticated access to an object exposed on this channel may allow unauthorized command execution. When properly configured with authentication, this vulnerability does not pose a risk.
This issue can be broken down into two components:
In version 5.5.76, the ability to execute arbitrary code has been completely removed. Starting with version 5.5.68, the release notes introduced support for "Encryption and Authentication Enforceable for Operations Over the Remoting Service." The SecurityMode parameter ensures that only authenticated users and endpoints can interact with the Data Platform User Console's remoting services.
We encourage customers to upgrade to the latest version of the Data Platform and enable appropriate security settings as detailed in the 5.5.68 release notes.
To further protect your environment, we recommend the following:
For identifying this issue and disclosing it to Flexera under the responsible disclosure process, we'd like to credit Tareq Tahboub of Trafford Security.
Oct 02, 2024 06:15 PM - edited Oct 04, 2024 08:46 PM