CVE-2020-25095

8.8 HIGH

📋 TL;DR

CVE-2020-25095 is a Cross-Site Request Forgery (CSRF) vulnerability in LogRhythm Platform Manager that allows Cross-site WebSocket Hijacking (CSWH). An attacker can trick a logged-in administrator into visiting a malicious website, which then creates a WebSocket connection to the vulnerable server and executes commands with the victim's privileges. This affects LogRhythm Platform Manager administrators who access the web interface.

💻 Affected Systems

Products:
  • LogRhythm Platform Manager
Versions: 7.4.9
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator to be logged into the Platform Manager web interface and visit a malicious site during the same browser session.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through remote command execution, data exfiltration, and complete administrative control over the LogRhythm platform.

🟠

Likely Case

Unauthorized command execution leading to data theft, system manipulation, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact due to proper network segmentation, web application firewalls, and CSRF protections preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to get victim to visit malicious site, but technical execution is straightforward once the victim is compromised.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.5.0 and later

Vendor Advisory: https://community.logrhythm.com/t5/Product-Security-Advisories/LogRhythm-Security-Advisory-for-CVE-2020-25095/ta-p/12241

Restart Required: Yes

Instructions:

1. Download LogRhythm Platform Manager version 7.5.0 or later from the LogRhythm support portal. 2. Follow the official upgrade documentation for your deployment. 3. Restart the Platform Manager service after installation.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection tokens to all WebSocket connection requests to prevent unauthorized connections.

Requires application code modification - consult LogRhythm documentation for implementation details

Restrict WebSocket Origins

all

Configure the server to only accept WebSocket connections from trusted origins.

Configure web server (Apache/Nginx/IIS) to validate Origin headers in WebSocket handshake requests

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies and Content Security Policy (CSP) headers to limit cross-origin requests.
  • Segment the LogRhythm Platform Manager network and restrict access to only trusted administrative workstations.

🔍 How to Verify

Check if Vulnerable:

Check the Platform Manager version via the web interface admin panel or system logs. If version is 7.4.9 or earlier, the system is vulnerable.

Check Version:

Check the web interface admin dashboard or consult LogRhythm system documentation for version checking commands specific to your deployment.

Verify Fix Applied:

Verify the Platform Manager version is 7.5.0 or later and test WebSocket connections with CSRF tokens properly implemented.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected WebSocket connections from unauthorized origins
  • Unusual command execution patterns in Platform Manager logs
  • Multiple failed WebSocket handshake attempts

Network Indicators:

  • WebSocket traffic from non-administrative IP addresses
  • Cross-origin WebSocket requests without proper CSRF tokens
  • Unusual WebSocket payload patterns

SIEM Query:

source="logrhythm-pm" AND (websocket_connection="true" AND origin!="trusted-domain.com") OR (command_execution="unexpected")

🔗 References

📤 Share & Export