CVE-2020-10581

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to bypass session validity checks in Invigo ADM administration functionalities, potentially accessing sensitive application data. It affects Invigo Automatic Device Management (ADM) systems up to version 5.0. Attackers can exploit this without authentication to read data they shouldn't have access to.

💻 Affected Systems

Products:
  • Invigo Automatic Device Management (ADM)
Versions: through 5.0
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Affects multiple administration functionalities according to the advisory. Specific components not detailed in public information.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive device management data, configuration files, and potentially credentials stored within the ADM application.

🟠

Likely Case

Unauthorized access to device configurations, management data, and potentially sensitive operational information hosted by the ADM application.

🟢

If Mitigated

Limited data exposure if proper network segmentation and access controls are implemented, though vulnerability remains present.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory indicates remote attackers can exploit this, suggesting relatively straightforward exploitation once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 5.0

Vendor Advisory: https://www.on-x.com/sites/default/files/security_advisory_-_multiple_vulnerabilities_-_invigo_adm.pdf

Restart Required: Yes

Instructions:

1. Contact Invigo support for patched version. 2. Backup current configuration. 3. Apply vendor-provided patch or upgrade to version after 5.0. 4. Restart ADM services. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to ADM administration interfaces to trusted networks only

Access Control Lists

all

Implement strict firewall rules limiting source IP addresses that can access ADM administration ports

🧯 If You Can't Patch

  • Implement network segmentation to isolate ADM systems from untrusted networks
  • Deploy web application firewall (WAF) with session validation rules

🔍 How to Verify

Check if Vulnerable:

Check ADM version via administration interface or configuration files. If version is 5.0 or earlier, assume vulnerable.

Check Version:

Check ADM web interface or configuration files for version information

Verify Fix Applied:

Verify version is updated beyond 5.0 and test session validation in administration functionalities.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to administration endpoints
  • Session validation failures
  • Access to sensitive data endpoints from unauthorized sources

Network Indicators:

  • HTTP requests bypassing session checks to administration APIs
  • Unauthenticated access to protected endpoints

SIEM Query:

source="ADM" AND (event_type="session_validation_failure" OR uri="/admin/*") AND user="anonymous"

🔗 References

📤 Share & Export