CVE-2016-0913

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote Replication Manager servers to execute arbitrary commands on affected systems by placing a crafted script in an SMB share. It affects EMC Replication Manager, EMC Network Module for Microsoft, and EMC Networker Module for Microsoft installations. Attackers can achieve remote code execution without authentication.

💻 Affected Systems

Products:
  • EMC Replication Manager (RM)
  • EMC Network Module for Microsoft
  • EMC Networker Module for Microsoft
Versions: RM before 5.5.3.0_01-PatchHotfix, Network Module for Microsoft 3.x, Networker Module for Microsoft 8.2.x before 8.2.3.6
Operating Systems: Windows (primary affected platform due to SMB)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SMB share access from remote RM servers; default configurations with SMB enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Remote code execution leading to data theft, installation of backdoors, or disruption of backup/replication services.

🟢

If Mitigated

Limited impact due to network segmentation, restricted SMB share access, and proper patch management.

🌐 Internet-Facing: HIGH if SMB shares are exposed to the internet, as exploitation is unauthenticated and allows remote code execution.
🏢 Internal Only: HIGH due to the potential for lateral movement and the unauthenticated nature of the exploit within internal networks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves placing a crafted script in an accessible SMB share, which is then executed by the vulnerable client.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: RM 5.5.3.0_01-PatchHotfix, Networker Module for Microsoft 8.2.3.6

Vendor Advisory: http://seclists.org/bugtraq/2016/Oct/6

Restart Required: Yes

Instructions:

1. Download the appropriate patch from EMC support. 2. Apply the patch to all affected systems. 3. Restart the Replication Manager services. 4. Verify the patch installation.

🔧 Temporary Workarounds

Restrict SMB Share Access

windows

Limit access to SMB shares used by Replication Manager to trusted RM servers only.

Use Windows Firewall or network ACLs to restrict SMB (ports 139, 445) access to specific IP addresses.

Disable Unnecessary SMB Shares

windows

Disable SMB shares that are not required for Replication Manager operations.

Remove or disable SMB shares via Windows Server Manager or PowerShell: Remove-SmbShare -Name ShareName

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Replication Manager systems from untrusted networks.
  • Monitor SMB share access logs for unauthorized script placement or execution attempts.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of EMC Replication Manager or Networker Module against the affected version ranges.

Check Version:

Check the software version in the Replication Manager console or via Windows Programs and Features.

Verify Fix Applied:

Verify that the patch version is installed and that SMB share access is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SMB file writes to Replication Manager shares
  • Execution of unexpected scripts or commands from SMB locations
  • Failed authentication attempts to SMB shares

Network Indicators:

  • SMB traffic from untrusted sources to Replication Manager systems
  • Unusual outbound connections following SMB file placement

SIEM Query:

source="windows" AND event_id=5145 AND share_name="*Replication*" AND relative_target="*.ps1" OR "*.bat"

🔗 References

📤 Share & Export