CVE-2017-12567

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Quest KACE management appliances allows attackers to execute arbitrary SQL commands through the web interface. It affects organizations using KACE Asset Management Appliance, Systems Management Appliance, or K1000 as a Service. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Quest KACE Asset Management Appliance
  • Quest KACE Systems Management Appliance
  • Quest K1000 as a Service
Versions: Asset Management Appliance 6.4.120822 through 7.2; Systems Management Appliance 6.4.120822 through 7.2.101; K1000 as a Service 7.0 through 7.2
Operating Systems: Appliance-based (Linux underlying OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable; no special configuration required for exploitation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover, data exfiltration, lateral movement to other systems, and persistent backdoor installation

🟠

Likely Case

Database compromise leading to credential theft, sensitive data exposure, and potential privilege escalation

🟢

If Mitigated

Limited impact with proper network segmentation, WAF protection, and minimal database privileges

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but SQL injection is straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Asset Management Appliance 8.0.317; Systems Management Appliance 8.0.317; K1000 as a Service 8.0.317

Vendor Advisory: https://support.quest.com/kace-systems-management-appliance/kb/231874

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download patch from Quest support portal. 3. Apply patch via KACE administrative interface. 4. Restart appliance services. 5. Verify patch installation.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF with SQL injection rules to block exploitation attempts

Network Segmentation

all

Restrict access to KACE appliances to authorized management networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the KACE web interface
  • Enable detailed SQL query logging and monitor for suspicious database activity

🔍 How to Verify

Check if Vulnerable:

Check current version via KACE administrative interface under Help > About

Check Version:

Not applicable - use web interface

Verify Fix Applied:

Verify version is 8.0.317 or later and test SQL injection vectors are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by SQL-like payloads
  • Administrative actions from unexpected IP addresses

Network Indicators:

  • SQL keywords in HTTP POST requests to KACE endpoints
  • Unusual database connection patterns

SIEM Query:

source="kace_web_logs" AND (http_request CONTAINS "UNION" OR http_request CONTAINS "SELECT" OR http_request CONTAINS "INSERT" OR http_request CONTAINS "DELETE")

🔗 References

📤 Share & Export