CVE-2020-15851
📋 TL;DR
CVE-2020-15851 is a critical access control vulnerability in Nakivo Backup & Replication Transporter that allows remote attackers to access unencrypted backup repositories and configuration data, and create or delete repositories. This affects version 9.4.0.r43656 of the software. Organizations using this vulnerable version are at risk of data exposure and system compromise.
💻 Affected Systems
- Nakivo Backup & Replication Transporter
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of backup infrastructure leading to data theft, ransomware deployment, destruction of backup repositories, and lateral movement to other systems.
Likely Case
Unauthorized access to sensitive backup data including potentially regulated information, configuration theft enabling further attacks, and backup repository manipulation.
If Mitigated
Limited impact if proper network segmentation and access controls prevent unauthorized network access to the transporter service.
🎯 Exploit Status
The vulnerability requires no authentication and has publicly available technical details, making exploitation straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 10.3 and later
Vendor Advisory: https://helpcenter.nakivo.com/display/RN/v10.3+Release+Notes
Restart Required: Yes
Instructions:
1. Download Nakivo Backup & Replication version 10.3 or later from the vendor portal. 2. Backup current configuration. 3. Run the installer to upgrade. 4. Restart all Nakivo services. 5. Verify functionality.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to the transporter service (port 9446) to only authorized management systems.
Firewall Rules
allImplement firewall rules to block external access to Nakivo transporter service.
# Example Linux iptables rule
iptables -A INPUT -p tcp --dport 9446 -j DROP
# Example Windows PowerShell
New-NetFirewallRule -DisplayName "Block Nakivo Transporter" -Direction Inbound -LocalPort 9446 -Protocol TCP -Action Block
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Nakivo systems from untrusted networks
- Monitor for unusual access patterns to port 9446 and review access logs regularly
🔍 How to Verify
Check if Vulnerable:
Check Nakivo Transporter version in web interface or configuration files. Version 9.4.0.r43656 is vulnerable.
Check Version:
On Linux: cat /opt/nakivo/transporter/version.txt
On Windows: Check version in installed programs list or Nakivo web interface
Verify Fix Applied:
Verify version is 10.3 or later in the Nakivo web interface or via the nakivo-backup command line tool.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to port 9446
- Unexpected repository creation/deletion events
- Unusual configuration changes
Network Indicators:
- External connections to port 9446
- Unusual data transfers from Nakivo systems
SIEM Query:
source_port=9446 AND (src_ip NOT IN [authorized_management_ips]) OR event_type="repository_creation" OR event_type="repository_deletion"
🔗 References
- https://helpcenter.nakivo.com/display/RN/v10.3+Release+Notes
- https://labs.f-secure.com/advisories/nakivo-backup-and-replication-multiple-vulnerabilities
- https://helpcenter.nakivo.com/display/RN/v10.3+Release+Notes
- https://labs.f-secure.com/advisories/nakivo-backup-and-replication-multiple-vulnerabilities