CVE-2020-24384

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary code on A10 Networks ACOS and aGalaxy management GUIs. It affects ACOS versions 3.2.2+, 4.x, and 5.1.x, and aGalaxy versions 3.0.x, 3.2.x, and 5.0.x. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • A10 Networks ACOS
  • A10 Networks aGalaxy
Versions: ACOS: 3.2.2+ through 3.2.x, all 4.x, 5.1.x; aGalaxy: 3.0.x, 3.2.x, 5.0.x
Operating Systems: A10 proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects management GUI interfaces; requires network access to management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover, data exfiltration, lateral movement within network, and persistent backdoor installation.

🟠

Likely Case

Unauthenticated remote code execution leading to service disruption, configuration changes, and credential theft.

🟢

If Mitigated

Limited impact if systems are isolated, patched, or have network controls preventing external access.

🌐 Internet-Facing: HIGH - Unauthenticated RCE with CVSS 9.8 makes internet-facing systems extremely vulnerable to compromise.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to any network-accessible attacker due to unauthenticated nature.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated RCE with CVSS 9.8 suggests relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ACOS: 5.2.1 or later; aGalaxy: 5.1.0 or later

Vendor Advisory: https://support.a10networks.com/support/security_advisory/acos-agalaxy-gui-rce-vulnerability-cve-2020-24384

Restart Required: Yes

Instructions:

1. Download appropriate patch from A10 support portal. 2. Backup configuration. 3. Apply patch following vendor instructions. 4. Restart affected services/systems. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to management interfaces to trusted IPs only

Configure firewall rules to allow only specific source IPs to management ports

Disable Management GUI

all

Temporarily disable web management interface if not required

Consult A10 documentation for disabling GUI management

🧯 If You Can't Patch

  • Implement strict network access controls to limit management interface exposure
  • Monitor management interface traffic for suspicious activity and implement IDS/IPS rules

🔍 How to Verify

Check if Vulnerable:

Check ACOS/aGalaxy version against affected ranges via CLI or web interface

Check Version:

show version (ACOS CLI) or check System Information in web GUI

Verify Fix Applied:

Verify installed version is ACOS 5.2.1+ or aGalaxy 5.1.0+

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to management interface
  • Unexpected process execution
  • Configuration changes from unknown sources

Network Indicators:

  • Unusual traffic patterns to management ports
  • Exploit-like payloads in HTTP requests to GUI

SIEM Query:

source_ip=* AND dest_port=(443,80,8443) AND dest_ip=ACOS_management AND http_user_agent contains suspicious_pattern

🔗 References

📤 Share & Export