CVE-2020-5847
📋 TL;DR
CVE-2020-5847 is an unauthenticated remote code execution vulnerability in Unraid that allows attackers to bypass authentication and execute arbitrary commands as root. This affects Unraid servers through version 6.8.0. Any Unraid system exposed to untrusted networks is at critical risk.
💻 Affected Systems
- Unraid
📦 What is this software?
Unraid by Unraid
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with root-level access, allowing attackers to install malware, exfiltrate data, pivot to other systems, or destroy the system.
Likely Case
Unauthenticated attackers gain root shell access to execute arbitrary commands, potentially leading to data theft, ransomware deployment, or persistent backdoors.
If Mitigated
If properly segmented and patched, impact is limited to isolated systems with minimal data exposure.
🎯 Exploit Status
Public exploit code available on Packet Storm and other sources. Exploitation requires no authentication and minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.8.1 and later
Vendor Advisory: https://forums.unraid.net/forum/7-announcements/
Restart Required: Yes
Instructions:
1. Log into Unraid web interface. 2. Navigate to Tools > Update OS. 3. Install Unraid 6.8.1 or later. 4. Reboot the system to apply changes.
🔧 Temporary Workarounds
Network Isolation
linuxBlock external access to Unraid management interface using firewall rules
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
Access Restriction
linuxRestrict Unraid web interface to trusted IP addresses only
iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
🧯 If You Can't Patch
- Immediately isolate Unraid system from internet and untrusted networks
- Implement strict network segmentation and monitor for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check Unraid version via web interface Dashboard or run 'cat /etc/unraid-version' on command line
Check Version:
cat /etc/unraid-version
Verify Fix Applied:
Verify version is 6.8.1 or later and test authentication bypass is no longer possible
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access to web interface endpoints
- Suspicious command execution in system logs
- Unexpected process creation as root
Network Indicators:
- Unusual outbound connections from Unraid system
- Exploit traffic patterns to management ports
SIEM Query:
source="unraid.log" AND ("authentication bypass" OR "unauthorized access" OR suspicious_command="*")
🔗 References
- http://packetstormsecurity.com/files/157275/Unraid-6.8.0-Authentication-Bypass-Arbitrary-Code-Execution.html
- https://forums.unraid.net/forum/7-announcements/
- https://sysdream.com/news/lab/
- https://sysdream.com/news/lab/2020-02-06-cve-2020-5847-cve-2020-5849-unraid-6-8-0-unauthenticated-remote-code-execution-as-root/
- http://packetstormsecurity.com/files/157275/Unraid-6.8.0-Authentication-Bypass-Arbitrary-Code-Execution.html
- https://forums.unraid.net/forum/7-announcements/
- https://sysdream.com/news/lab/
- https://sysdream.com/news/lab/2020-02-06-cve-2020-5847-cve-2020-5849-unraid-6-8-0-unauthenticated-remote-code-execution-as-root/
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-5847