CVE-2020-25068
📋 TL;DR
CVE-2020-25068 is a local file inclusion vulnerability in Setelsa Conacwin access control software that allows remote unauthenticated attackers to read internal server files via directory traversal. This affects version 3.7.1.2, though the vendor disputes this version's existence and claims the issue was fixed in 2017.
💻 Affected Systems
- Setelsa Conacwin
📦 What is this software?
Conacwin by Setelsa Security
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive files like configuration files, passwords, or system files, potentially leading to full system compromise.
Likely Case
Unauthenticated attackers reading application configuration files containing credentials or sensitive data.
If Mitigated
Limited impact with proper network segmentation and file system permissions restricting access to sensitive files.
🎯 Exploit Status
Public exploit code available on GitHub. Simple directory traversal attack requiring minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 2017 (vendor claims fix applied in 2017)
Vendor Advisory: http://setelsa-security.es/productos/control-de-acceso/
Restart Required: Yes
Instructions:
1. Contact Setelsa for latest version. 2. Verify current version. 3. Upgrade to version after 2017. 4. Restart application services.
🔧 Temporary Workarounds
Network Access Control
allRestrict access to Conacwin web interface to trusted networks only
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_NETWORK" port port="PORT" protocol="tcp" accept'
netsh advfirewall firewall add rule name="Conacwin" dir=in action=allow protocol=TCP localport=PORT remoteip=TRUSTED_NETWORK
Web Server Configuration
allConfigure web server to reject directory traversal patterns
# Apache: <LocationMatch "\.\."> Require all denied </LocationMatch>
# Nginx: location ~ \.\. { deny all; }
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Conacwin from untrusted networks
- Deploy web application firewall (WAF) with directory traversal protection rules
🔍 How to Verify
Check if Vulnerable:
Attempt to access http://IP:PORT/../../windows/win.ini (or equivalent sensitive file) and check if file contents are returned
Check Version:
Check application interface or configuration files for version information
Verify Fix Applied:
Attempt same directory traversal attack after patch - should receive 404 or access denied error
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../' patterns
- Unusual file access patterns from web application logs
- Access to sensitive system files from web user context
Network Indicators:
- HTTP requests with multiple directory traversal sequences
- Unusual file downloads from web application port
SIEM Query:
source="web_logs" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*")