CVE-2020-10917

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to execute arbitrary code with SYSTEM privileges on NEC ESMPRO Manager installations. The flaw exists in the RMI service due to improper deserialization of untrusted data. Organizations using NEC ESMPRO Manager 6.42 are affected.

💻 Affected Systems

Products:
  • NEC ESMPRO Manager
Versions: 6.42
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The RMI service is vulnerable by default in affected versions. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling attackers to install malware, steal data, pivot to other systems, or disrupt operations.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data exfiltration, or creation of persistent backdoors.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internal instances are vulnerable to network-based attacks without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI published detailed advisory with exploitation details. The vulnerability is easily weaponized due to the deserialization nature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later versions after 6.42

Vendor Advisory: https://www.nec.com/en/global/prod/esmpro/security/2020/20200630.html

Restart Required: Yes

Instructions:

1. Download and install the latest NEC ESMPRO Manager version from NEC's official website. 2. Apply all security patches. 3. Restart the ESMPRO Manager service. 4. Verify the RMI service is no longer vulnerable.

🔧 Temporary Workarounds

Block RMI Service Ports

windows

Block network access to the vulnerable RMI service ports using firewall rules.

netsh advfirewall firewall add rule name="Block ESMPRO RMI" dir=in action=block protocol=TCP localport=1099,1098,1097,1096 remoteip=any

Disable RMI Service

windows

Disable the vulnerable RMI service component if not required for operations.

sc config "NEC ESMPRO Manager RMI" start=disabled
sc stop "NEC ESMPRO Manager RMI"

🧯 If You Can't Patch

  • Isolate affected systems in a restricted network segment with strict access controls.
  • Implement network-based intrusion detection/prevention systems to monitor for exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check if NEC ESMPRO Manager version 6.42 is installed and the RMI service is running on ports 1096-1099.

Check Version:

Check NEC ESMPRO Manager About dialog or installation directory version files.

Verify Fix Applied:

Verify the installed version is newer than 6.42 and test that RMI deserialization attacks no longer succeed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual RMI service connections
  • Failed deserialization attempts in application logs
  • Unexpected process creation with SYSTEM privileges

Network Indicators:

  • RMI protocol traffic to ports 1096-1099 with suspicious payloads
  • Outbound connections from ESMPRO Manager to unknown IPs

SIEM Query:

source="ESMPRO" AND (event="RMI Deserialization" OR process="cmd.exe" OR user="SYSTEM")

🔗 References

📤 Share & Export