CVE-2020-14260

9.8 CRITICAL

📋 TL;DR

CVE-2020-14260 is a critical buffer overflow vulnerability in HCL Domino's DXL component that allows remote code execution. Attackers can exploit improper input validation to crash servers or execute arbitrary code. All Domino servers running vulnerable versions are affected.

💻 Affected Systems

Products:
  • HCL Domino
Versions: Versions prior to 9.0.1 FP10 IF6, 10.0.1 FP5, and 11.0.1
Operating Systems: Windows, Linux, AIX, IBM i
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Domino configurations with DXL enabled are vulnerable. DXL is typically enabled by default for Domino web services.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the Domino server, enabling data theft, lateral movement, and persistent access.

🟠

Likely Case

Server crashes causing service disruption, followed by remote code execution leading to data exfiltration or ransomware deployment.

🟢

If Mitigated

Limited to denial of service if input validation controls are partially effective, but RCE remains possible with crafted payloads.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Buffer overflow vulnerabilities in widely used enterprise software are frequently weaponized. The high CVSS score and remote unauthenticated nature make this attractive to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.1 FP10 IF6, 10.0.1 FP5, or 11.0.1

Vendor Advisory: https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085500

Restart Required: Yes

Instructions:

1. Download appropriate fix pack from HCL Support. 2. Apply fix pack following HCL installation procedures. 3. Restart Domino server. 4. Verify patch installation.

🔧 Temporary Workarounds

Disable DXL Services

all

Temporarily disable Domino XML (DXL) web services if not required

Edit notes.ini: DXLWebServiceEnabled=0
Restart Domino server

Network Segmentation

all

Restrict access to Domino DXL ports (typically 80/443) using firewalls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Domino servers from untrusted networks
  • Deploy web application firewall (WAF) with buffer overflow protection rules

🔍 How to Verify

Check if Vulnerable:

Check Domino version against affected versions list. If running versions prior to 9.0.1 FP10 IF6, 10.0.1 FP5, or 11.0.1, system is vulnerable.

Check Version:

show server (Domino console) or check domino/notes.ini file

Verify Fix Applied:

Verify Domino version shows patched version (9.0.1 FP10 IF6, 10.0.1 FP5, or 11.0.1) and test DXL functionality if re-enabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DXL request patterns
  • Large payloads to DXL endpoints
  • Server crash/restart events

Network Indicators:

  • Excessive traffic to Domino DXL ports
  • Malformed XML payloads

SIEM Query:

source="domino" AND (event="crash" OR event="restart") OR (uri="*/dxl*" AND size>threshold)

🔗 References

📤 Share & Export