CVE-2017-6972

9.8 CRITICAL

📋 TL;DR

This vulnerability in AlienVault USM/OSSIM and NfSen allows attackers to execute arbitrary code with root privileges due to improper privilege dropping. The NfSen Perl code unnecessarily runs as root, enabling complete system compromise. Affected users include those running vulnerable versions of these security monitoring products.

💻 Affected Systems

Products:
  • AlienVault USM
  • AlienVault OSSIM
  • NfSen
Versions: AlienVault USM/OSSIM before 5.3.7, NfSen before 1.3.8
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability affects the privilege dropping mechanism in NfSen Perl code execution.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root access, allowing installation of persistent backdoors, data exfiltration, and lateral movement across the network.

🟠

Likely Case

Remote code execution leading to compromise of the security monitoring system, potentially disabling security controls and providing attacker persistence.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are implemented, though the system would still be vulnerable to compromise.

🌐 Internet-Facing: HIGH - These products are often deployed as internet-facing security monitoring solutions, making them prime targets for exploitation.
🏢 Internal Only: HIGH - Even internally deployed, compromise provides attacker foothold with root privileges in security infrastructure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB (ID 42314), making this easily weaponizable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AlienVault USM/OSSIM 5.3.7+, NfSen 1.3.8+

Vendor Advisory: https://www.alienvault.com/forums/discussion/8698

Restart Required: Yes

Instructions:

1. Backup configuration and data. 2. Update to AlienVault USM/OSSIM 5.3.7 or later via the AlienVault update mechanism. 3. For NfSen, update to version 1.3.8 or later from SourceForge. 4. Restart affected services.

🔧 Temporary Workarounds

Network Segmentation

linux

Isolate affected systems from critical networks and limit inbound connections

iptables -A INPUT -p tcp --dport [NfSen_port] -s [trusted_networks] -j ACCEPT
iptables -A INPUT -p tcp --dport [NfSen_port] -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to trusted sources only
  • Monitor for unusual process execution or privilege escalation attempts on affected systems

🔍 How to Verify

Check if Vulnerable:

Check version: For AlienVault: cat /etc/alienvault-release. For NfSen: check nfsen.conf or installation directory for version.

Check Version:

AlienVault: cat /etc/alienvault-release | grep Version; NfSen: grep version /usr/local/nfsen/etc/nfsen.conf

Verify Fix Applied:

Verify version is AlienVault 5.3.7+ or NfSen 1.3.8+. Check that NfSen processes are not running as root.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Perl process execution as root
  • Unexpected privilege escalation attempts
  • Suspicious commands executed from NfSen context

Network Indicators:

  • Unexpected outbound connections from NfSen/AlienVault systems
  • Traffic to known malicious IPs from monitoring systems

SIEM Query:

process_name:"perl" AND user:"root" AND parent_process:"nfsen" OR process_name:"nfsen" AND user:"root"

🔗 References

📤 Share & Export