CVE-2020-7850
📋 TL;DR
CVE-2020-7850 is an argument injection vulnerability in the NBBDownloader.ocx ActiveX control in Groupware that allows remote file download and execution. Attackers can craft malicious web pages to exploit this when users visit them, potentially leading to malware infection. This affects users of Groupware with the vulnerable ActiveX control installed.
💻 Affected Systems
- Groupware
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through remote code execution, leading to data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Malware infection through drive-by download attacks when users visit compromised or malicious websites.
If Mitigated
Limited impact with proper browser security settings, ActiveX controls disabled, or application whitelisting in place.
🎯 Exploit Status
Exploitation requires user interaction (visiting malicious webpage) but no authentication. Attack vector is straightforward once malicious page is crafted.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in available references
Vendor Advisory: http://help.neobizbox.com/
Restart Required: Yes
Instructions:
1. Check vendor advisory at http://help.neobizbox.com/ 2. Apply latest Groupware update 3. Restart affected systems 4. Verify NBBDownloader.ocx is updated
🔧 Temporary Workarounds
Disable ActiveX in Internet Explorer
windowsPrevents ActiveX controls from running in Internet Explorer
Internet Options → Security tab → Custom level → Disable ActiveX controls and plug-ins
Kill-bit the vulnerable control
windowsPrevents the specific ActiveX control from loading
reg add "HKLM\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{CLSID}" /v "Compatibility Flags" /t REG_DWORD /d 0x400 /f
🧯 If You Can't Patch
- Use browsers that don't support ActiveX (Chrome, Firefox, Edge Chromium)
- Implement application whitelisting to block NBBDownloader.ocx execution
🔍 How to Verify
Check if Vulnerable:
Check if NBBDownloader.ocx exists in system and check its version against patched versions from vendor
Check Version:
wmic datafile where name="C:\\path\\to\\NBBDownloader.ocx" get version
Verify Fix Applied:
Verify NBBDownloader.ocx file version matches patched version from vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Internet Explorer/ActiveX logs showing NBBDownloader.ocx loading
- Process creation from Internet Explorer spawning unexpected executables
Network Indicators:
- HTTP requests to unusual domains from Internet Explorer process
- Downloads of executable files via browser
SIEM Query:
process_name:iexplore.exe AND (process_child_name:*.exe OR file_create:*.exe)