CVE-2020-13175

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to read LDAP credentials via local file inclusion in Teradici Cloud Access Connector's Management Interface. Attackers can exploit specially crafted HTTP requests to leak sensitive authentication data. Organizations using affected versions of Teradici Cloud Access Connector or Cloud Access Connector Legacy are at risk.

💻 Affected Systems

Products:
  • Teradici Cloud Access Connector
  • Teradici Cloud Access Connector Legacy
Versions: All versions prior to April 20, 2020 (v15 and earlier for Cloud Access Connector)
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Management Interface component specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain LDAP credentials, potentially compromising domain authentication systems and enabling lateral movement across the network.

🟠

Likely Case

LDAP credential theft leading to unauthorized access to network resources and potential privilege escalation.

🟢

If Mitigated

Limited to credential exposure without further exploitation if strong network segmentation and monitoring are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting HTTP requests but does not require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions released on or after April 20, 2020

Vendor Advisory: https://advisory.teradici.com/security-advisories/59/

Restart Required: Yes

Instructions:

1. Download latest version from Teradici portal. 2. Backup current configuration. 3. Install update following vendor documentation. 4. Restart services. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Management Interface to trusted IPs only

Configure firewall rules to allow only specific source IPs to Management Interface port

Disable Management Interface

all

Temporarily disable Management Interface if not required

Consult Teradici documentation for service disable commands

🧯 If You Can't Patch

  • Implement strict network access controls to limit Management Interface exposure
  • Monitor for suspicious HTTP requests to Management Interface endpoints

🔍 How to Verify

Check if Vulnerable:

Check version number in Teradici Cloud Access Connector admin interface or configuration files

Check Version:

Check Teradici admin console or configuration files for version information

Verify Fix Applied:

Confirm version is April 20, 2020 or later and test Management Interface functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to Management Interface
  • Multiple failed authentication attempts following credential exposure

Network Indicators:

  • HTTP requests with unusual parameters to Management Interface endpoints
  • External IPs accessing Management Interface

SIEM Query:

source="teradici_logs" AND (http_uri CONTAINS "management" OR http_uri CONTAINS "admin") AND http_method="GET" AND http_status=200

🔗 References

📤 Share & Export