CVE-2019-13131

9.8 CRITICAL

📋 TL;DR

CVE-2019-13131 is a critical remote code execution vulnerability in Super Micro SuperDoctor 5 monitoring software. Attackers can execute arbitrary commands via the Nagios Remote Plugin Executor (NRPE) interface when agent.cfg restrictions aren't properly configured. This affects organizations using SuperDoctor 5 for server monitoring without proper security controls.

💻 Affected Systems

Products:
  • Super Micro SuperDoctor 5
Versions: All versions prior to patched versions
Operating Systems: Linux, Windows (if SuperDoctor 5 is installed)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when NRPE restrictions are not properly implemented in agent.cfg configuration file. Default installations may be vulnerable if security hardening wasn't performed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with high privileges, potentially leading to data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Remote attackers gain command execution on monitoring servers, enabling them to install backdoors, exfiltrate data, or pivot to other systems in the environment.

🟢

If Mitigated

With proper network segmentation and NRPE restrictions, impact is limited to the monitoring system itself with no lateral movement capability.

🌐 Internet-Facing: HIGH - If SuperDoctor 5 is exposed to the internet, attackers can directly exploit this without any authentication.
🏢 Internal Only: HIGH - Even internally, any compromised system or malicious insider can exploit this vulnerability to gain command execution.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB (47030). Attack requires network access to NRPE port (default 5666) and knowledge of target system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Super Micro security advisory for specific patched versions

Vendor Advisory: https://www.supermicro.com/support/security_Bulletins.cfm

Restart Required: Yes

Instructions:

1. Check Super Micro security bulletins for patch details. 2. Download and apply the latest SuperDoctor 5 update. 3. Restart SuperDoctor 5 services. 4. Verify NRPE restrictions are properly configured in agent.cfg.

🔧 Temporary Workarounds

Implement NRPE Restrictions

linux

Configure agent.cfg to restrict NRPE command execution to authorized hosts and commands only

Edit /opt/Supermicro/SuperDoctor5/agent.cfg
Add 'allowed_hosts=trusted_ip_addresses'
Add 'command[check_command]=/path/to/command' with strict permissions

Network Segmentation

linux

Restrict access to NRPE port (default 5666) using firewall rules

iptables -A INPUT -p tcp --dport 5666 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 5666 -j DROP

🧯 If You Can't Patch

  • Implement strict firewall rules to allow NRPE access only from trusted monitoring servers
  • Disable SuperDoctor 5 NRPE service if not absolutely required for monitoring operations

🔍 How to Verify

Check if Vulnerable:

Check if NRPE service is running on port 5666 and test if arbitrary commands can be executed using check_nrpe tool: 'check_nrpe -H target_ip -c check_command'

Check Version:

/opt/Supermicro/SuperDoctor5/sd5 -v or check SuperDoctor 5 interface for version information

Verify Fix Applied:

Test NRPE command execution attempts from unauthorized hosts should be blocked. Verify agent.cfg has proper allowed_hosts restrictions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual NRPE connection attempts from unauthorized IPs
  • Failed authentication attempts to NRPE service
  • Execution of unexpected commands via NRPE

Network Indicators:

  • Unusual traffic to port 5666 from non-monitoring systems
  • NRPE protocol anomalies or malformed requests

SIEM Query:

source_port=5666 AND (src_ip NOT IN [monitoring_servers] OR command NOT IN [allowed_commands])

🔗 References

📤 Share & Export