CVE-2017-6187

9.8 CRITICAL

📋 TL;DR

CVE-2017-6187 is a critical buffer overflow vulnerability in DiskSavvy Enterprise's built-in web server that allows remote attackers to execute arbitrary code by sending a specially crafted long URI in a GET request. This affects all systems running the vulnerable version of DiskSavvy Enterprise with the web server enabled. Attackers can gain complete control over affected systems without authentication.

💻 Affected Systems

Products:
  • DiskSavvy Enterprise
Versions: 9.4.18 and likely earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The built-in web server must be enabled and accessible. Default installation likely enables this feature for remote administration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, ransomware deployment, or use as a pivot point in network attacks.

🟠

Likely Case

Remote code execution resulting in malware installation, data exfiltration, or system takeover for botnet participation.

🟢

If Mitigated

Limited impact if web server is disabled or network access is restricted, though the vulnerability remains present in the software.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication and has public exploit code available.
🏢 Internal Only: HIGH - Even internally, any attacker with network access to the vulnerable service can exploit it without credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available on Exploit-DB (ID 41436), making exploitation trivial for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.5.14 or later

Vendor Advisory: https://www.disksavvy.com/

Restart Required: Yes

Instructions:

1. Download latest version from DiskSavvy website. 2. Install over existing installation. 3. Restart the DiskSavvy service or reboot system.

🔧 Temporary Workarounds

Disable Built-in Web Server

windows

Disable the vulnerable web server component to prevent remote exploitation.

Open DiskSavvy Enterprise > Settings > Web Server > Uncheck 'Enable Web Server'

Network Segmentation

windows

Restrict network access to DiskSavvy web server port (default 80/8080).

Windows Firewall: netsh advfirewall firewall add rule name="Block DiskSavvy" dir=in action=block protocol=TCP localport=80,8080 program="C:\Program Files\DiskSavvy\disksavvy.exe"

🧯 If You Can't Patch

  • Disable the built-in web server immediately in DiskSavvy settings
  • Implement strict network access controls to block all external and unnecessary internal access to the DiskSavvy service port

🔍 How to Verify

Check if Vulnerable:

Check DiskSavvy version in Help > About. If version is 9.4.18 or earlier, and web server is enabled, system is vulnerable.

Check Version:

In DiskSavvy: Help > About shows version. Command line: wmic product where name="DiskSavvy Enterprise" get version

Verify Fix Applied:

Verify version is 9.5.14 or later in Help > About, and test with a long URI GET request to confirm no crash occurs.

📡 Detection & Monitoring

Log Indicators:

  • DiskSavvy service crashes
  • Unusually long URI requests in web server logs
  • Memory access violation errors in Windows Event Logs

Network Indicators:

  • HTTP GET requests with URIs longer than typical (1000+ characters)
  • Traffic to DiskSavvy web server port (80/8080) with abnormal patterns

SIEM Query:

source="disksavvy.log" AND (uri_length>1000 OR "buffer overflow" OR "access violation") OR source="Windows Security" AND process_name="disksavvy.exe" AND event_id=1000

🔗 References

📤 Share & Export