CVE-2020-5560

9.8 CRITICAL

📋 TL;DR

CVE-2020-5560 is a critical remote code execution vulnerability in WL-Enq software that allows attackers to execute arbitrary operating system commands with administrative privileges. This affects WL-Enq versions 1.11 and 1.12, potentially compromising entire systems running this software.

💻 Affected Systems

Products:
  • WL-Enq
Versions: 1.11, 1.12
Operating Systems: Any OS running WL-Enq
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, allowing attackers to install malware, steal data, pivot to other systems, or deploy ransomware.

🟠

Likely Case

Remote attackers gain administrative shell access to vulnerable systems, enabling data theft, service disruption, and lateral movement within networks.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to isolated segments, though compromised systems still require full remediation.

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing instances extremely vulnerable to automated attacks.
🏢 Internal Only: HIGH - Even internally, this provides administrative access that can lead to complete network compromise through lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

While no public PoC exists, the CVSS 9.8 score and remote unauthenticated nature make weaponization highly probable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.13 or later

Vendor Advisory: https://jvn.jp/en/jp/JVN27951364/index.html

Restart Required: Yes

Instructions:

1. Backup current WL-Enq configuration and data. 2. Download and install WL-Enq version 1.13 or later from official vendor sources. 3. Restart the WL-Enq service. 4. Verify functionality and restore configuration if needed.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to WL-Enq instances using firewall rules to only allow trusted IP addresses.

iptables -A INPUT -p tcp --dport [WL-Enq-port] -s [trusted-ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [WL-Enq-port] -j DROP

Application Firewall Rules

all

Implement web application firewall rules to block OS command injection patterns.

🧯 If You Can't Patch

  • Isolate vulnerable systems in separate network segments with strict firewall rules
  • Implement network-based intrusion detection/prevention systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check WL-Enq version via web interface or configuration files. Versions 1.11 or 1.12 are vulnerable.

Check Version:

Check web interface or configuration files for version information

Verify Fix Applied:

Verify WL-Enq version is 1.13 or later and test functionality remains intact.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful access
  • Suspicious process creation from WL-Enq service

Network Indicators:

  • Unusual outbound connections from WL-Enq server
  • Command and control traffic patterns
  • Unexpected port scanning from WL-Enq host

SIEM Query:

source="WL-Enq-logs" AND (process_execution OR command_injection OR suspicious_commands)

🔗 References

📤 Share & Export