CVE-2020-25836

6.3 MEDIUM

📋 TL;DR

This vulnerability in OpenText NetIQ Directory and Resource Administrator allows unauthorized access to sensitive information. It affects organizations using versions prior to 10.0.2 or 9.2.1 Patch 10 of these identity management products.

💻 Affected Systems

Products:
  • OpenText NetIQ Directory Administrator
  • OpenText NetIQ Resource Administrator
Versions: All versions prior to 10.0.2 and all versions prior to 9.2.1 Patch 10
Operating Systems: Windows Server, Linux distributions supported by NetIQ
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Directory Administrator and Resource Administrator components of the NetIQ identity management suite.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive directory information, credentials, or administrative data leading to privilege escalation or lateral movement.

🟠

Likely Case

Unauthorized users accessing sensitive configuration or user data stored within the directory administration system.

🟢

If Mitigated

Limited exposure with proper network segmentation and access controls in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

CWE-200 typically requires some level of access or knowledge of the system, but specific exploit details are not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.2 or 9.2.1 Patch 10

Vendor Advisory: https://www.netiq.com/documentation/directory-and-resource-administrator-10/releasenotes_10.0.2/data/releasenotes_10.0.2.html#b149h4pv

Restart Required: Yes

Instructions:

1. Download the appropriate patch from the OpenText support portal. 2. Backup your current installation. 3. Apply the patch following vendor instructions. 4. Restart the NetIQ services. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to NetIQ administration interfaces to authorized management networks only.

Access Control Hardening

all

Implement strict access controls and authentication requirements for all administrative interfaces.

🧯 If You Can't Patch

  • Implement network segmentation to isolate NetIQ systems from untrusted networks
  • Enhance monitoring and logging of access to sensitive directory information

🔍 How to Verify

Check if Vulnerable:

Check the installed version of NetIQ Directory and Resource Administrator via the administration console or installation directory.

Check Version:

Check the product version in the NetIQ administration console under Help > About, or examine the installation directory for version files.

Verify Fix Applied:

Verify the version number shows 10.0.2 or higher, or 9.2.1 Patch 10 or higher in the administration interface.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to sensitive data endpoints
  • Unusual query patterns in directory access logs
  • Access from unexpected IP addresses to administrative interfaces

Network Indicators:

  • Unusual traffic patterns to NetIQ administration ports
  • Requests for sensitive data endpoints from unauthorized sources

SIEM Query:

source="netiq_logs" AND (event_type="data_access" OR event_type="sensitive_query") AND user NOT IN authorized_users_list

🔗 References

📤 Share & Export