CVE-2017-2766

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to change passwords without verification in EMC Documentum eRoom. Affected systems include eRoom versions 7.4.4, 7.4.4 SP1, versions prior to 7.4.5 P04, and versions prior to 7.5.0 P01.

💻 Affected Systems

Products:
  • EMC Documentum eRoom
Versions: 7.4.4, 7.4.4 SP1, versions prior to 7.4.5 P04, versions prior to 7.5.0 P01
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations of affected versions are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through administrative account takeover leading to data theft, system manipulation, and lateral movement within the network.

🟠

Likely Case

Unauthorized access to sensitive documents and user accounts, potentially leading to data exfiltration or privilege escalation.

🟢

If Mitigated

Limited impact if strong network segmentation and monitoring are in place, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH - Internet-facing instances can be directly attacked without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the eRoom server but no authentication, making it trivial for attackers with access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.5 P04 or 7.5.0 P01

Vendor Advisory: https://www.dell.com/support/security/en-us

Restart Required: Yes

Instructions:

1. Download patches from Dell EMC support portal. 2. Apply patch according to vendor documentation. 3. Restart eRoom services. 4. Verify patch installation.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to eRoom servers to trusted IP addresses only.

Use firewall rules to allow only specific IP ranges to access eRoom ports (typically 80/443)

Authentication Layer

all

Implement additional authentication mechanisms like VPN or reverse proxy with MFA.

Configure web application firewall or reverse proxy with additional authentication

🧯 If You Can't Patch

  • Isolate eRoom servers in a restricted network segment with no internet access
  • Implement strict monitoring for password change attempts and failed logins

🔍 How to Verify

Check if Vulnerable:

Check eRoom version in administration console or via version files in installation directory.

Check Version:

Check web interface or consult eRoom administration documentation for version command

Verify Fix Applied:

Verify installed version is 7.4.5 P04 or higher, or 7.5.0 P01 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual password change requests, multiple failed login attempts followed by successful password reset

Network Indicators:

  • HTTP POST requests to password change endpoints from unexpected IP addresses

SIEM Query:

source="eroom.log" AND (event="password_change" OR event="reset_password") AND user="*" | stats count by src_ip

🔗 References

📤 Share & Export