CVE-2020-15639

9.8 CRITICAL

📋 TL;DR

This is a critical path traversal vulnerability in Marvell QConvergeConsole that allows unauthenticated remote attackers to execute arbitrary code with SYSTEM privileges. The flaw exists in the decryptFile method where user-supplied paths aren't properly validated before file operations. All systems running the affected version are vulnerable to complete compromise.

💻 Affected Systems

Products:
  • Marvell QConvergeConsole
Versions: 5.5.0.64
Operating Systems: Windows (based on SYSTEM context)
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the FlashValidatorServiceImpl class decryptFile method. Authentication is not required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with SYSTEM privileges, allowing attackers to install malware, steal data, pivot to other systems, or disrupt operations.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data exfiltration, or creation of persistent backdoors.

🟢

If Mitigated

Attackers can still attempt exploitation but will be blocked by network segmentation and proper access controls.

🌐 Internet-Facing: HIGH - No authentication required and CVSS 9.8 score indicates critical risk for internet-exposed systems.
🏢 Internal Only: HIGH - Even internally, this allows lateral movement and privilege escalation within networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI-CAN-10496 identifier suggests detailed research exists. No authentication required makes exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 5.5.0.64 (check vendor advisory for specific fixed version)

Vendor Advisory: https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf

Restart Required: Yes

Instructions:

1. Download the latest patched version from Marvell support portal. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart the QConvergeConsole service. 5. Verify the patch is applied.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate QConvergeConsole from untrusted networks and internet access

Access Control Lists

all

Restrict network access to QConvergeConsole to only trusted management IPs

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and untrusted networks
  • Implement strict network segmentation and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check QConvergeConsole version - if it's 5.5.0.64, the system is vulnerable.

Check Version:

Check QConvergeConsole web interface or installation directory for version information

Verify Fix Applied:

Verify the version is updated to a patched release (greater than 5.5.0.64) and test path traversal attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in decryptFile method
  • Failed path traversal attempts
  • Unexpected process execution with SYSTEM privileges

Network Indicators:

  • Unusual outbound connections from QConvergeConsole system
  • Exploitation attempts targeting the vulnerable endpoint

SIEM Query:

source="QConvergeConsole" AND (event="decryptFile" OR event="file_access") AND path CONTAINS ".."

🔗 References

📤 Share & Export