CVE-2019-19518

9.8 CRITICAL

📋 TL;DR

CA Automic Sysload versions 5.6.0 through 6.1.2 have a critical vulnerability where the File Server port lacks authentication. This allows remote attackers to execute arbitrary commands on affected systems. Organizations running these versions of CA Automic Sysload are at risk.

💻 Affected Systems

Products:
  • CA Automic Sysload
Versions: 5.6.0 through 6.1.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration where the File Server port lacks authentication mechanisms.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Unauthorized access to sensitive files, system manipulation, and potential privilege escalation leading to persistent access.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the vulnerable port.

🌐 Internet-Facing: HIGH - Directly exposed systems can be exploited remotely without authentication.
🏢 Internal Only: HIGH - Even internally, lack of authentication allows any network-connected attacker to exploit the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and allows direct command execution, making exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.1.3 and later

Vendor Advisory: https://techdocs.broadcom.com/us/product-content/recommended-reading/security-notices/ca20191210-01-security-notice-for-ca-automic-sysload.html

Restart Required: Yes

Instructions:

1. Download the latest version (6.1.3+) from Broadcom support portal. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the Sysload service to apply changes.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to the File Server port using firewall rules to only trusted IP addresses.

# Example iptables rule: iptables -A INPUT -p tcp --dport [FILE_SERVER_PORT] -s [TRUSTED_IP] -j ACCEPT
# Example Windows Firewall: New-NetFirewallRule -DisplayName 'Sysload File Server' -Direction Inbound -Protocol TCP -LocalPort [FILE_SERVER_PORT] -RemoteAddress [TRUSTED_IP] -Action Allow

Port Change with Authentication

all

Change the default File Server port and implement additional authentication layers if supported.

# Modify Sysload configuration file to change port and enable authentication if available

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Sysload servers from untrusted networks.
  • Deploy intrusion detection systems to monitor for exploitation attempts on the File Server port.

🔍 How to Verify

Check if Vulnerable:

Check the Sysload version via the admin interface or configuration files. If version is between 5.6.0 and 6.1.2, the system is vulnerable.

Check Version:

# Check version in Sysload admin console or configuration files

Verify Fix Applied:

Verify the installed version is 6.1.3 or later and test that authentication is required for File Server port access.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to File Server port
  • Unexpected command execution logs from Sysload processes

Network Indicators:

  • Unusual network traffic to the File Server port from untrusted sources
  • Command and control traffic originating from Sysload servers

SIEM Query:

source='sysload.log' AND (event='authentication_failed' OR event='unauthorized_access') OR dest_port=[FILE_SERVER_PORT] AND src_ip NOT IN [TRUSTED_NETWORKS]

🔗 References

📤 Share & Export