CVE-2021-22496

7.5 HIGH

📋 TL;DR

CVE-2021-22496 is an authentication bypass vulnerability in Micro Focus Access Manager that allows attackers to bypass authentication mechanisms and potentially access sensitive information. This affects all versions prior to 4.5.3.3 of the Access Manager product. Organizations using vulnerable versions are at risk of unauthorized access to protected resources.

💻 Affected Systems

Products:
  • Micro Focus Access Manager
Versions: All versions prior to 4.5.3.3
Operating Systems: All supported platforms for Access Manager
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Access Manager system leading to unauthorized access to all protected applications and sensitive user data, potentially enabling lateral movement within the network.

🟠

Likely Case

Unauthorized access to protected applications and information leakage of user credentials, session data, or other sensitive information managed by Access Manager.

🟢

If Mitigated

Limited impact with proper network segmentation and additional authentication layers, though the core vulnerability remains exploitable.

🌐 Internet-Facing: HIGH - Authentication bypass vulnerabilities in internet-facing identity management systems are prime targets for attackers seeking initial access.
🏢 Internal Only: MEDIUM - While less exposed, internal systems remain vulnerable to insider threats or attackers who have already breached perimeter defenses.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically have low exploitation complexity once the bypass method is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5.3.3

Vendor Advisory: https://www.netiq.com/documentation/access-manager-45-appliance/accessmanager453-p3-release-notes/data/accessmanager453-p3-release-notes.html

Restart Required: Yes

Instructions:

1. Download Access Manager version 4.5.3.3 from Micro Focus support portal. 2. Backup current configuration and data. 3. Apply the update following Micro Focus upgrade documentation. 4. Restart Access Manager services. 5. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Access Manager to only trusted IP addresses and networks

iptables -A INPUT -p tcp --dport [Access Manager Port] -s [Trusted Network] -j ACCEPT
iptables -A INPUT -p tcp --dport [Access Manager Port] -j DROP

🧯 If You Can't Patch

  • Implement additional authentication layer (MFA) for all applications protected by Access Manager
  • Isolate Access Manager to internal network segments only and remove internet-facing access

🔍 How to Verify

Check if Vulnerable:

Check Access Manager version via admin console or configuration files. Versions below 4.5.3.3 are vulnerable.

Check Version:

Check version in Access Manager admin console or review installation logs for version information.

Verify Fix Applied:

Verify version shows 4.5.3.3 or higher in admin interface and test authentication flows work correctly.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access without proper credentials
  • Unusual access patterns from unexpected IP addresses
  • Authentication bypass attempts in access logs

Network Indicators:

  • Unusual authentication traffic patterns
  • Access to protected resources without proper authentication handshake

SIEM Query:

source="access_manager" AND (event_type="auth_bypass" OR (auth_result="success" AND auth_method="unknown"))

🔗 References

📤 Share & Export