CVE-2020-13160

9.8 CRITICAL

📋 TL;DR

This CVE describes a format string vulnerability in AnyDesk on Linux and FreeBSD systems that allows remote attackers to execute arbitrary code. The vulnerability affects AnyDesk versions before 5.5.3 and can be exploited without authentication. Organizations using vulnerable AnyDesk installations on Linux or FreeBSD are at risk of complete system compromise.

💻 Affected Systems

Products:
  • AnyDesk
Versions: Versions before 5.5.3
Operating Systems: Linux, FreeBSD
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Linux and FreeBSD versions. Windows and macOS versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full control of the system, installs persistent malware, pivots to other systems, and exfiltrates sensitive data.

🟠

Likely Case

Attacker executes arbitrary code with the privileges of the AnyDesk process, potentially gaining initial foothold for further network exploitation.

🟢

If Mitigated

If proper network segmentation and least privilege are implemented, impact is limited to the isolated AnyDesk host with minimal lateral movement risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit proofs exist, and the vulnerability can be exploited remotely without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.3 and later

Vendor Advisory: https://download.anydesk.com/changelog.txt

Restart Required: Yes

Instructions:

1. Download AnyDesk 5.5.3 or later from official website. 2. Stop AnyDesk service. 3. Install the new version. 4. Restart AnyDesk service.

🔧 Temporary Workarounds

Disable AnyDesk Service

linux

Temporarily disable AnyDesk to prevent exploitation while planning upgrade

sudo systemctl stop anydesk
sudo systemctl disable anydesk

Network Isolation

linux

Block AnyDesk ports at firewall to prevent remote access

sudo iptables -A INPUT -p tcp --dport 7070 -j DROP
sudo iptables -A INPUT -p udp --dport 7070 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit AnyDesk traffic to trusted IPs only
  • Run AnyDesk with minimal privileges using a dedicated low-privilege user account

🔍 How to Verify

Check if Vulnerable:

Check AnyDesk version: anydesk --version and compare to 5.5.3

Check Version:

anydesk --version

Verify Fix Applied:

Verify version is 5.5.3 or higher: anydesk --version | grep -q '5.5.3\|^[6-9]\|^5\.[6-9]\|^5\.5\.[4-9]' && echo 'Patched'

📡 Detection & Monitoring

Log Indicators:

  • Unusual AnyDesk process activity
  • Suspicious network connections to AnyDesk port 7070
  • Format string error messages in system logs

Network Indicators:

  • Unusual traffic patterns to AnyDesk default port 7070
  • Connection attempts from unexpected IP addresses

SIEM Query:

source="anydesk.log" AND ("format string" OR "segmentation fault" OR "buffer overflow")

🔗 References

📤 Share & Export