CVE-2021-20072

7.2 HIGH

📋 TL;DR

This vulnerability in Racom's MIDGE Firmware allows authenticated attackers to perform directory traversal attacks, enabling arbitrary file access and deletion. It affects systems running the vulnerable firmware version. Attackers with valid credentials can exploit this to compromise system integrity.

💻 Affected Systems

Products:
  • Racom MIDGE Firmware
Versions: 4.4.40.105
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. Affects specific firmware version of Racom MIDGE devices.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files or exfiltration of sensitive configuration data, potentially leading to device bricking or unauthorized access to network infrastructure.

🟠

Likely Case

Unauthorized access to sensitive files, configuration tampering, or deletion of operational files causing service disruption.

🟢

If Mitigated

Limited impact with proper access controls, network segmentation, and monitoring in place to detect traversal attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but directory traversal techniques are well-documented and easy to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later than 4.4.40.105

Vendor Advisory: https://www.tenable.com/security/research/tra-2021-04

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Contact Racom for patched firmware. 3. Backup configuration. 4. Apply firmware update. 5. Verify update success. 6. Restart device.

🔧 Temporary Workarounds

Restrict Access Controls

all

Implement strict access controls and limit authenticated user privileges to minimize attack surface.

Network Segmentation

all

Isolate affected devices in separate network segments with strict firewall rules.

🧯 If You Can't Patch

  • Implement strict network access controls to limit device exposure
  • Enable detailed logging and monitoring for directory traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device web interface or CLI. If version is 4.4.40.105, device is vulnerable.

Check Version:

Check via device web interface or manufacturer-specific CLI commands

Verify Fix Applied:

Verify firmware version is updated to a version later than 4.4.40.105 and test directory traversal attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Directory traversal strings in logs
  • Multiple failed access attempts

Network Indicators:

  • HTTP requests containing '../' patterns
  • Unusual file access to system directories

SIEM Query:

http.uri contains "../" AND device.vendor="Racom" AND device.model="MIDGE"

🔗 References

📤 Share & Export