CVE-2019-14479
📋 TL;DR
CVE-2019-14479 is a remote code execution vulnerability in AdRem NetCrunch network monitoring software. A read-only administrator account can execute arbitrary code on the NetCrunch server, potentially compromising the entire monitoring system. Organizations using NetCrunch 10.6.0.4587 are affected.
💻 Affected Systems
- AdRem NetCrunch
📦 What is this software?
Netcrunch by Adremsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the NetCrunch server leading to lateral movement within the network, data exfiltration, and deployment of persistent backdoors.
Likely Case
Attacker gains full control of the NetCrunch server, potentially using it as a pivot point to attack other systems in the network.
If Mitigated
Limited impact if proper network segmentation and least privilege access controls are implemented.
🎯 Exploit Status
Exploitation requires read-only administrator credentials. Public technical details and proof-of-concept are available in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to NetCrunch 10.6.0.4587 hotfix or later version
Vendor Advisory: https://www.adremsoft.com/support/
Restart Required: Yes
Instructions:
1. Download the latest patch from AdRemSoft support portal. 2. Backup NetCrunch configuration and data. 3. Apply the patch following vendor instructions. 4. Restart NetCrunch services. 5. Verify the update was successful.
🔧 Temporary Workarounds
Restrict Web Interface Access
allLimit access to NetCrunch web interface to only trusted networks and users.
Configure firewall rules to restrict access to NetCrunch web port (typically 80/443)
Reduce Administrator Privileges
allReview and minimize read-only administrator accounts. Implement least privilege access.
Review NetCrunch user accounts and remove unnecessary admin privileges
🧯 If You Can't Patch
- Isolate NetCrunch server in a dedicated network segment with strict firewall rules
- Implement network monitoring for suspicious activity targeting the NetCrunch server
🔍 How to Verify
Check if Vulnerable:
Check NetCrunch version in web interface or server console. If version is exactly 10.6.0.4587 without patches, it is vulnerable.
Check Version:
In NetCrunch web interface: Help → About, or check server installation directory for version files.
Verify Fix Applied:
Verify version has been updated beyond 10.6.0.4587. Check vendor patch notes for specific fix version.
📡 Detection & Monitoring
Log Indicators:
- Unusual process execution from NetCrunch service account
- Suspicious web requests to NetCrunch administrative endpoints
- Failed authentication attempts followed by successful read-only admin login
Network Indicators:
- Unusual outbound connections from NetCrunch server
- Traffic patterns suggesting command and control activity
SIEM Query:
source="netcrunch" AND (event_type="process_execution" OR http_status=200 AND uri CONTAINS "/admin/")
🔗 References
- https://compass-security.com/fileadmin/Research/Advisories/2020-13_CSNC-2019-014_AdRem_NetCrunch_Remote_Code_Execution.txt
- https://www.adremsoft.com/support/
- https://compass-security.com/fileadmin/Research/Advisories/2020-13_CSNC-2019-014_AdRem_NetCrunch_Remote_Code_Execution.txt
- https://www.adremsoft.com/support/