CVE-2018-14705
📋 TL;DR
CVE-2018-14705 is an authentication bypass vulnerability in Drobo 5N2 network-attached storage devices where all optional applications lack authentication/authorization validation. Any network-accessible user can interact with and control these applications, posing severe risks to data confidentiality, integrity, and application availability. This affects Drobo 5N2 users running vulnerable firmware.
💻 Affected Systems
- Drobo 5N2
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of all data stored on the device, unauthorized application control, data exfiltration, ransomware deployment, and permanent data loss.
Likely Case
Unauthorized access to applications and data, potential data theft or modification, and disruption of application services.
If Mitigated
Limited to authorized users only with proper authentication controls in place.
🎯 Exploit Status
Exploitation requires only network access to the device. No authentication or special tools needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.0.6 and later
Vendor Advisory: https://support.drobo.com/app/answers/detail/a_id/3159
Restart Required: Yes
Instructions:
1. Log into Drobo Dashboard. 2. Check for firmware updates. 3. Install firmware version 4.0.6 or later. 4. Reboot the device after installation.
🔧 Temporary Workarounds
Disable optional applications
allRemove or disable all optional applications on the Drobo 5N2 to eliminate the attack surface.
Access Drobo Dashboard > Applications > Disable/Remove all optional applications
Network segmentation
allIsolate Drobo device on separate VLAN with strict access controls.
🧯 If You Can't Patch
- Immediately disconnect the device from any network until patched
- Implement strict network access controls allowing only trusted IP addresses
🔍 How to Verify
Check if Vulnerable:
Check firmware version in Drobo Dashboard. If version is 4.0.5, the device is vulnerable.
Check Version:
Access Drobo Dashboard > Settings > About to view firmware version
Verify Fix Applied:
Verify firmware version is 4.0.6 or later in Drobo Dashboard.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to application endpoints
- Unexpected application control events
Network Indicators:
- Unusual network traffic to Drobo application ports
- Unauthorized API calls to Drobo services
SIEM Query:
source="drobo" AND (event_type="application_access" OR event_type="unauthorized_access")
🔗 References
- https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc
- https://www.ise.io/casestudies/sohopelessly-broken-2-0/
- https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc
- https://www.ise.io/casestudies/sohopelessly-broken-2-0/