CVE-2013-20004
📋 TL;DR
This vulnerability in StarWind iSCSI target allows attackers to cause denial of service by repeatedly attempting connections to non-existent targets, which causes the service to allocate memory without limits. This affects StarWind iSCSI SAN (Windows Native) Version 6.0, build 2013-01-16. Organizations using this specific version are vulnerable.
💻 Affected Systems
- StarWind iSCSI SAN (Windows Native)
📦 What is this software?
Iscsi San by Starwindsoftware
⚠️ Risk & Real-World Impact
Worst Case
Complete service outage due to memory exhaustion, rendering iSCSI storage inaccessible to legitimate clients
Likely Case
Service degradation or crash requiring manual restart, disrupting storage access
If Mitigated
Minimal impact with connection rate limiting and memory protection controls
🎯 Exploit Status
Simple connection flooding attack requiring no authentication or special tools
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after build 2013-01-16
Vendor Advisory: https://www.starwindsoftware.com/security/sw-20130215-0001/
Restart Required: Yes
Instructions:
1. Download updated version from StarWind website
2. Backup configuration
3. Install update
4. Restart StarWind service
🔧 Temporary Workarounds
Network Access Control
windowsRestrict iSCSI port access to trusted networks only
Use Windows Firewall: New-NetFirewallRule -DisplayName "Block iSCSI" -Direction Inbound -LocalPort 3260 -Protocol TCP -Action Block
Connection Rate Limiting
allImplement network-level connection rate limiting
🧯 If You Can't Patch
- Isolate iSCSI network segment from untrusted networks
- Implement monitoring for abnormal connection patterns
🔍 How to Verify
Check if Vulnerable:
Check StarWind service version in About dialog or registry: HKEY_LOCAL_MACHINE\SOFTWARE\StarWind Software\StarWind\Version
Check Version:
reg query "HKLM\SOFTWARE\StarWind Software\StarWind" /v Version
Verify Fix Applied:
Verify version is newer than 6.0 build 2013-01-16 and test connection flooding
📡 Detection & Monitoring
Log Indicators:
- High frequency of failed connection attempts in StarWind logs
- Memory usage spikes in system logs
Network Indicators:
- Unusual volume of TCP connections to port 3260
- Connection attempts to non-existent iSCSI targets
SIEM Query:
source="starwind.log" AND "connection failed" | stats count by src_ip | where count > 100