CVE-2016-10043

10.0 CRITICAL

📋 TL;DR

CVE-2016-10043 is a critical OS command injection vulnerability in Radisys MRF Web Panel (SWMS) that allows attackers to execute arbitrary commands on the underlying system. The vulnerability affects version 9.0.1 and enables complete system compromise through the web interface. Organizations running this specific version of Radisys MRF Web Panel are at risk.

💻 Affected Systems

Products:
  • Radisys MRF Web Panel (SWMS)
Versions: 9.0.1
Operating Systems: Linux-based systems running the MRF Web Panel
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover, data exfiltration, installation of persistent backdoors, and use of the system as a pivot point for lateral movement within the network.

🟠

Likely Case

Unauthorized command execution leading to service disruption, data theft, and potential privilege escalation to root/system-level access.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and least-privilege principles are implemented.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via HTTP POST requests and public exploit code exists, making internet-facing instances immediate targets.
🏢 Internal Only: HIGH - Even internally accessible instances are vulnerable to authenticated or network-accessible attackers.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to the web panel, but once authenticated, the exploit is trivial using publicly available proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 9.0.1

Vendor Advisory: https://www.radisys.com/support/security-advisories

Restart Required: Yes

Instructions:

1. Contact Radisys support for the latest patched version. 2. Backup current configuration. 3. Apply the update following vendor instructions. 4. Restart the MRF Web Panel service. 5. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Input Validation and Sanitization

linux

Implement strict input validation on the MSM_MACRO_NAME parameter to reject pipe characters and other shell metacharacters.

Modify /swms/ms.cgi to sanitize MSM_MACRO_NAME parameter before processing

Web Application Firewall Rules

all

Deploy WAF rules to block requests containing pipe characters in POST parameters to /swms/ms.cgi.

Add WAF rule: Block if ARGS:MSM_MACRO_NAME contains '|'

🧯 If You Can't Patch

  • Isolate the MRF Web Panel system in a dedicated network segment with strict firewall rules limiting access to authorized IPs only.
  • Implement network-based intrusion detection/prevention systems to monitor for command injection patterns in web traffic.

🔍 How to Verify

Check if Vulnerable:

Test by sending a POST request to /swms/ms.cgi with MSM_MACRO_NAME parameter containing a pipe character followed by a harmless command like '|id' (requires authentication).

Check Version:

Check the web panel interface or configuration files for version information, or contact Radisys support for version verification tools.

Verify Fix Applied:

Attempt the same test after patching; the system should reject the request or properly sanitize the input without executing the command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /swms/ms.cgi containing pipe characters in parameters
  • Apache logs showing command execution patterns in URLs
  • System logs showing commands executed by apache user that don't match normal application behavior

Network Indicators:

  • HTTP POST requests to /swms/ms.cgi with shell metacharacters in parameters
  • Unusual outbound connections from the MRF server following web requests

SIEM Query:

source="web_logs" AND uri="/swms/ms.cgi" AND (post_param="*|*" OR post_param="*;*" OR post_param="*&*" OR post_param="*`*")

🔗 References

📤 Share & Export