CVE-2015-6922
📋 TL;DR
CVE-2015-6922 is an authentication bypass vulnerability in Kaseya VSA that allows remote attackers to add administrative accounts or upload and execute arbitrary files without authentication. This affects Kaseya VSA versions 7.x before 7.0.0.33, 8.x before 8.0.0.23, 9.0 before 9.0.0.19, and 9.1 before 9.1.0.9. Organizations using these vulnerable versions are at risk of complete system compromise.
💻 Affected Systems
- Kaseya Virtual System Administrator (VSA)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover: attackers can create admin accounts, upload malware, execute arbitrary code, and gain persistent access to all managed systems.
Likely Case
Ransomware deployment, data theft, or lateral movement across the network using the compromised Kaseya infrastructure.
If Mitigated
Limited impact if systems are isolated, but still significant risk due to authentication bypass.
🎯 Exploit Status
Exploit code is publicly available on Exploit-DB and other sources. The vulnerability requires only HTTP requests to specific endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.0.0.33, 8.0.0.23, 9.0.0.19, 9.1.0.9 or later
Vendor Advisory: https://helpdesk.kaseya.com/entries/96164487--Kaseya-Security-Advisory
Restart Required: Yes
Instructions:
1. Download the appropriate patch from Kaseya support portal. 2. Backup current configuration and database. 3. Apply the patch following Kaseya's installation guide. 4. Restart the Kaseya VSA service. 5. Verify the patch applied successfully.
🔧 Temporary Workarounds
Block Vulnerable Endpoints
windowsTemporarily block access to the vulnerable ASPX endpoints via web server configuration or firewall rules.
# IIS URL Rewrite rule to block LocalAuth/setAccount.aspx and ConfigTab/uploader.aspx
# Add to web.config in system.webServer section:
# <rewrite><rules><rule name="BlockVulnerableEndpoints" stopProcessing="true"><match url="^(LocalAuth/setAccount\.aspx|ConfigTab/uploader\.aspx)" /><action type="AbortRequest" /></rule></rules></rewrite>
Network Segmentation
windowsIsolate Kaseya VSA server from internet and restrict access to trusted management networks only.
# Firewall rules to restrict access (example for Windows Firewall):
netsh advfirewall firewall add rule name="RestrictKaseya" dir=in action=allow protocol=TCP localport=80,443 remoteip=192.168.1.0/24,10.0.0.0/8
🧯 If You Can't Patch
- Immediately isolate the Kaseya VSA server from all untrusted networks, especially the internet.
- Implement strict network access controls, allowing only necessary administrative traffic from trusted IP ranges.
🔍 How to Verify
Check if Vulnerable:
Check Kaseya VSA version via the web interface (Help > About) or examine installed version in Programs and Features. Compare against affected versions.
Check Version:
Check via Kaseya web interface or examine registry: HKEY_LOCAL_MACHINE\SOFTWARE\Kaseya\Agent\Version
Verify Fix Applied:
Verify version is 7.0.0.33+, 8.0.0.23+, 9.0.0.19+, or 9.1.0.9+. Test authentication requirements for LocalAuth/setAccount.aspx and ConfigTab/uploader.aspx endpoints.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /LocalAuth/setAccount.aspx or /ConfigTab/uploader.aspx without prior authentication
- Unusual account creation events in Kaseya audit logs
- File uploads to unexpected paths via uploader.aspx
Network Indicators:
- HTTP POST requests to vulnerable endpoints from unexpected source IPs
- Unusual outbound connections from Kaseya server following exploitation
SIEM Query:
source="kaseya" AND (url="*setAccount.aspx" OR url="*uploader.aspx") AND NOT user="*"
🔗 References
- http://packetstormsecurity.com/files/133782/Kaseya-Virtual-System-Administrator-Code-Execution-Privilege-Escalation.html
- http://www.zerodayinitiative.com/advisories/ZDI-15-448
- http://www.zerodayinitiative.com/advisories/ZDI-15-449
- https://helpdesk.kaseya.com/entries/96164487--Kaseya-Security-Advisory
- https://www.exploit-db.com/exploits/38351/
- http://packetstormsecurity.com/files/133782/Kaseya-Virtual-System-Administrator-Code-Execution-Privilege-Escalation.html
- http://www.zerodayinitiative.com/advisories/ZDI-15-448
- http://www.zerodayinitiative.com/advisories/ZDI-15-449
- https://helpdesk.kaseya.com/entries/96164487--Kaseya-Security-Advisory
- https://www.exploit-db.com/exploits/38351/