CVE-2016-6602

9.8 CRITICAL

📋 TL;DR

CVE-2016-6602 is a vulnerability in ZOHO WebNMS Framework where passwords are stored using weak obfuscation, allowing attackers who can access the securitydbData.xml file to easily recover cleartext passwords. This affects WebNMS Framework 5.2 and 5.2 SP1 installations. When combined with CVE-2016-6601 (directory traversal), this can be exploited remotely to gain administrative access.

💻 Affected Systems

Products:
  • ZOHO WebNMS Framework
Versions: 5.2 and 5.2 SP1
Operating Systems: All platforms running WebNMS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration where passwords are stored in WEB-INF/conf/securitydbData.xml using weak obfuscation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise: attackers obtain administrative credentials, gain complete control over the WebNMS system, and potentially pivot to other systems using those credentials.

🟠

Likely Case

Credential theft leading to unauthorized administrative access to the WebNMS management interface, allowing configuration changes, data access, and further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation, file access controls, and monitoring preventing access to the vulnerable configuration file.

🌐 Internet-Facing: HIGH - When combined with CVE-2016-6601, this can be exploited remotely without authentication to steal credentials from internet-facing systems.
🏢 Internal Only: MEDIUM - Internal attackers with access to the system or network could still exploit this to escalate privileges or move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Metasploit module available (webnms_cred_disclosure). Exploitation is straightforward once the securitydbData.xml file is accessed, often via CVE-2016-6601 directory traversal.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 5.2 SP1

Vendor Advisory: https://www.zohocorp.com/security/webnms.html

Restart Required: Yes

Instructions:

1. Upgrade to WebNMS Framework version 5.2 SP2 or later. 2. Apply the patch from ZOHO. 3. Restart the WebNMS service. 4. Change all passwords stored in the system.

🔧 Temporary Workarounds

Restrict access to WEB-INF directory

linux

Apply strict file permissions to prevent unauthorized access to the securitydbData.xml file.

chmod 600 /path/to/WEB-INF/conf/securitydbData.xml
chown root:root /path/to/WEB-INF/conf/securitydbData.xml

Network segmentation and access controls

all

Isolate WebNMS systems and restrict access to management interfaces.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the WebNMS interface
  • Monitor access to WEB-INF/conf/securitydbData.xml and alert on any unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if WebNMS version is 5.2 or 5.2 SP1, and examine WEB-INF/conf/securitydbData.xml for weakly obfuscated password strings.

Check Version:

Check the WebNMS documentation or interface for version information, or examine the installation directory for version files.

Verify Fix Applied:

Verify WebNMS version is 5.2 SP2 or later, and confirm securitydbData.xml uses stronger encryption or hashing.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to WEB-INF/conf/securitydbData.xml
  • Multiple failed login attempts followed by successful login with stolen credentials

Network Indicators:

  • Unusual traffic patterns to/from the WebNMS server
  • Directory traversal attempts (../ sequences) in HTTP requests

SIEM Query:

source="webnms" AND (url="*WEB-INF*" OR url="*securitydbData.xml*")

🔗 References

📤 Share & Export