CVE-2020-13658

8.0 HIGH

📋 TL;DR

This CSRF vulnerability in Lansweeper allows low-level authenticated users to escalate their privileges by tricking administrators into performing unintended actions. It affects Lansweeper web console users who have access to the application interface. Attackers can exploit this to gain administrative control over the Lansweeper system.

💻 Affected Systems

Products:
  • Lansweeper
Versions: 8.0.130.17 and likely earlier versions
Operating Systems: Windows (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web console interface of Lansweeper. Requires authenticated low-level user access to initiate attack.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Lansweeper system with attacker gaining administrative privileges, allowing them to modify configurations, access sensitive asset data, and potentially pivot to other systems.

🟠

Likely Case

Privilege escalation within Lansweeper allowing unauthorized access to sensitive asset information and system configuration.

🟢

If Mitigated

Limited impact with proper CSRF protections and user awareness training in place.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires authenticated access, internet-facing Lansweeper instances increase attack surface.
🏢 Internal Only: HIGH - Internal attackers with low-level access can escalate privileges to compromise the entire Lansweeper deployment.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated low-level user and ability to trick administrator into clicking malicious link. Technical advisory provides detailed exploitation methodology.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.130.18 or later

Vendor Advisory: https://www.lansweeper.com/knowledgebase/security-update-for-lansweeper-8-0/

Restart Required: Yes

Instructions:

1. Download latest Lansweeper version from vendor portal. 2. Backup current installation. 3. Run installer to upgrade. 4. Restart Lansweeper services. 5. Verify version shows 8.0.130.18 or higher.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all state-changing requests in Lansweeper web interface

Requires custom development - implement unique tokens per session for all POST/PUT/DELETE requests

Restrict User Permissions

all

Minimize number of low-level users and implement strict role-based access control

Review and reduce user permissions in Lansweeper administration console

🧯 If You Can't Patch

  • Implement network segmentation to isolate Lansweeper server from general user access
  • Enable detailed logging and monitoring for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Lansweeper version in web console admin panel or via Help > About. Version 8.0.130.17 or earlier is vulnerable.

Check Version:

In Lansweeper web console: Navigate to Help > About or check server installation directory properties.

Verify Fix Applied:

Verify version shows 8.0.130.18 or later. Test CSRF protection by attempting to modify user privileges without proper tokens.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege changes in Lansweeper audit logs
  • Multiple failed login attempts followed by successful privilege modification

Network Indicators:

  • HTTP requests to Lansweeper admin endpoints without referrer headers or CSRF tokens
  • Unusual outbound connections from Lansweeper server

SIEM Query:

source="lansweeper" AND (event_type="privilege_change" OR event_type="user_modification") AND user_role="low_level"

🔗 References

📤 Share & Export