CVE-2020-29127
📋 TL;DR
This vulnerability allows authentication bypass on Fujitsu Eternus Storage DX200 S4 devices. After a root user logs into the web portal, attackers can access the portal with root privileges from different browsers using a specific URI. This affects all users of these storage devices through November 25, 2020.
💻 Affected Systems
- Fujitsu Eternus Storage DX200 S4
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of storage system allowing data theft, destruction, or ransomware deployment with root-level access.
Likely Case
Unauthorized access to sensitive storage configuration, data management, and potential data exfiltration.
If Mitigated
Limited impact if network segmentation prevents external access and strong authentication controls are in place.
🎯 Exploit Status
Exploit requires knowledge of the specific URI pattern but is trivial to execute once known. Requires initial root login session.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 2020-11-25
Vendor Advisory: https://www.first.org/members/teams/fujitsu_psirt
Restart Required: Yes
Instructions:
1. Contact Fujitsu support for latest firmware. 2. Backup configuration. 3. Apply firmware update. 4. Restart device. 5. Verify fix by testing authentication bypass.
🔧 Temporary Workarounds
Network Segmentation
allRestrict access to storage management interface to trusted networks only
Session Management
allImplement strict session timeout policies and require re-authentication for sensitive operations
🧯 If You Can't Patch
- Isolate storage management interface behind VPN with multi-factor authentication
- Implement network monitoring for unauthorized access attempts to the management portal
🔍 How to Verify
Check if Vulnerable:
Test if accessing cgi-bin/csp?cspid={any_id}&csppage=cgi_PgOverview&csplang=en from different browser after root login grants access.
Check Version:
Check firmware version in web portal under System Information or via CLI: show version
Verify Fix Applied:
After patching, attempt the same bypass technique - should result in authentication prompt or access denial.
📡 Detection & Monitoring
Log Indicators:
- Multiple successful logins from different IPs/browsers in short timeframe
- Access to cgi-bin/csp URIs without preceding authentication logs
Network Indicators:
- HTTP requests to /cgi-bin/csp with cspid parameter from unauthorized sources
SIEM Query:
source="web_logs" AND uri="/cgi-bin/csp" AND NOT user="root" | stats count by src_ip
🔗 References
- http://packetstormsecurity.com/files/160255/Fujitsu-Eternus-Storage-DX200-S4-Broken-Authentication.html
- https://cxsecurity.com/issue/WLB-2020110215
- https://seccops.com/fujitsu-eternus-storage-dx200-s4-broken-authentication/
- https://www.first.org/members/teams/fujitsu_psirt
- http://packetstormsecurity.com/files/160255/Fujitsu-Eternus-Storage-DX200-S4-Broken-Authentication.html
- https://cxsecurity.com/issue/WLB-2020110215
- https://seccops.com/fujitsu-eternus-storage-dx200-s4-broken-authentication/
- https://www.first.org/members/teams/fujitsu_psirt