CVE-2019-3493

8.8 HIGH

📋 TL;DR

This vulnerability in Micro Focus Network Automation and Network Operations Management software allows remote attackers to execute arbitrary code on affected systems. It affects all versions of Network Operations Management and specific versions of Network Automation Software. The vulnerability can be exploited remotely without authentication.

💻 Affected Systems

Products:
  • Micro Focus Network Automation Software
  • Micro Focus Network Operations Management
Versions: Network Automation: 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11; Network Operations Management: All versions
Operating Systems: Not specified - likely multiple platforms supported by the software
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable by default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to install malware, steal data, pivot to other systems, or disrupt network operations.

🟠

Likely Case

Attacker gains full control of the affected system, potentially using it as a foothold for lateral movement within the network.

🟢

If Mitigated

If properly segmented and monitored, impact limited to isolated system with detection of unauthorized access attempts.

🌐 Internet-Facing: HIGH - Vulnerability can be exploited remotely without authentication, making internet-facing systems immediate targets.
🏢 Internal Only: HIGH - Even internally, the remote code execution capability poses significant risk to network infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vendor advisory indicates remote exploitation without authentication is possible, suggesting relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Network Automation: 2018.11 Update 1 or later; Network Operations Management: Apply latest security patches

Vendor Advisory: https://softwaresupport.softwaregrp.com/doc/KM03407763

Restart Required: Yes

Instructions:

1. Review vendor advisory KM03407763. 2. Download appropriate patches from Micro Focus support portal. 3. Apply patches following vendor documentation. 4. Restart affected services/systems. 5. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from untrusted networks and limit access to authorized management networks only.

Access Control Restrictions

all

Implement strict firewall rules to limit access to affected systems to only necessary IP addresses.

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and untrusted networks
  • Implement strict network segmentation and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check software version against affected versions list. Review system logs for unusual access patterns or unexpected processes.

Check Version:

Check within software administration interface or consult vendor documentation for version checking commands.

Verify Fix Applied:

Verify installed version is patched (Network Automation 2018.11 Update 1 or later). Check vendor patch documentation for specific verification steps.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution
  • Unusual network connections from affected systems
  • Authentication bypass attempts
  • System configuration changes

Network Indicators:

  • Unusual outbound connections from affected systems
  • Traffic patterns inconsistent with normal operations
  • Exploit attempt signatures in network traffic

SIEM Query:

Search for: process execution from network automation services, unexpected command execution, authentication failures followed by successful access

🔗 References

📤 Share & Export