CVE-2020-15645

8.8 HIGH

📋 TL;DR

This vulnerability in Marvell QConvergeConsole allows authenticated remote attackers to bypass authentication and execute arbitrary code with SYSTEM privileges. The flaw exists in the getFileFromURL method where user-supplied paths aren't properly validated before file operations. Affected installations are those running Marvell QConvergeConsole 5.5.0.64.

💻 Affected Systems

Products:
  • Marvell QConvergeConsole
Versions: 5.5.0.64
Operating Systems: Windows (based on SYSTEM context)
Default Config Vulnerable: ⚠️ Yes
Notes: Authentication is required but can be bypassed. The vulnerability allows execution in SYSTEM context, indicating Windows operating system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install malware, steal data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Unauthorized file access and remote code execution leading to data theft, system manipulation, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place, though authentication bypass remains a concern.

🌐 Internet-Facing: HIGH - Authentication bypass combined with RCE makes internet-facing instances extremely vulnerable to compromise.
🏢 Internal Only: HIGH - Even internally, authenticated users or compromised credentials could lead to SYSTEM-level code execution.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Authentication bypass exists, making exploitation easier for attackers with any level of access. ZDI-CAN-10553 tracking suggests active research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version beyond 5.5.0.64 (check vendor advisory for specific fixed version)

Vendor Advisory: https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf

Restart Required: Yes

Instructions:

1. Download the latest patched version from Marvell support portal. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart the QConvergeConsole service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to QConvergeConsole to only trusted administrative networks

Use firewall rules to limit access: Windows Firewall with Advanced Security or network appliance ACLs

Authentication Hardening

all

Implement additional authentication layers and monitor for suspicious login attempts

Configure multi-factor authentication if supported, implement account lockout policies

🧯 If You Can't Patch

  • Isolate the QConvergeConsole server in a dedicated VLAN with strict firewall rules allowing only necessary administrative access
  • Implement application-level monitoring and file integrity monitoring to detect exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check QConvergeConsole version in application interface or installation directory. Version 5.5.0.64 is vulnerable.

Check Version:

Check application GUI or installation properties. On Windows, check program files directory or registry entries for version information.

Verify Fix Applied:

Verify version number after update is greater than 5.5.0.64. Test authentication bypass attempts should fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns via getFileFromURL method
  • Multiple failed authentication attempts followed by successful access
  • Unexpected SYSTEM privilege processes spawned from QConvergeConsole

Network Indicators:

  • Unusual outbound connections from QConvergeConsole server
  • Traffic patterns suggesting file transfer or command execution

SIEM Query:

source="QConvergeConsole" AND (event="getFileFromURL" OR event="authentication_bypass" OR process="SYSTEM")

🔗 References

📤 Share & Export