CVE-2021-25693

7.5 HIGH

📋 TL;DR

CVE-2021-25693 is a null pointer dereference vulnerability in Teradici PCoIP Agent that allows attackers to cause a Denial of Service (DoS) by crashing the service. This affects organizations using Teradici PCoIP Agent for remote desktop access across multiple versions. The vulnerability requires network access to the PCoIP service.

💻 Affected Systems

Products:
  • Teradici PCoIP Agent
Versions: Multiple versions prior to the patched release
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects standard PCoIP Agent installations; requires network access to the PCoIP service port (typically 4172).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of PCoIP remote desktop sessions, preventing users from accessing virtual desktops or workstations.

🟠

Likely Case

Intermittent service crashes affecting PCoIP connectivity, requiring service restarts to restore functionality.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, allowing quick detection and recovery.

🌐 Internet-Facing: MEDIUM - Exploitable if PCoIP service is exposed to untrusted networks, but requires specific targeting.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could disrupt PCoIP services within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Null pointer dereference vulnerabilities typically require minimal exploitation complexity once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Teradici advisory for specific patched versions

Vendor Advisory: https://advisory.teradici.com/security-advisories/79/

Restart Required: Yes

Instructions:

1. Review Teradici advisory for affected versions. 2. Download and install the latest patched version from Teradici. 3. Restart the PCoIP Agent service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to PCoIP service port (typically 4172/TCP) to trusted hosts only.

Firewall Rules

all

Implement firewall rules to block untrusted sources from accessing PCoIP service.

🧯 If You Can't Patch

  • Implement strict network access controls to limit PCoIP service exposure
  • Monitor PCoIP service logs for crash events and implement automated alerting

🔍 How to Verify

Check if Vulnerable:

Check PCoIP Agent version against Teradici's advisory; versions prior to the patched release are vulnerable.

Check Version:

Windows: Check PCoIP Agent in Programs and Features. Linux: Check package version via package manager.

Verify Fix Applied:

Verify PCoIP Agent version matches or exceeds the patched version listed in Teradici advisory.

📡 Detection & Monitoring

Log Indicators:

  • PCoIP Agent service crash events
  • Unexpected service termination logs
  • Null pointer exception in application logs

Network Indicators:

  • Multiple connection attempts to PCoIP port 4172 from single source
  • Malformed PCoIP protocol packets

SIEM Query:

source="pcoip-agent" AND (event_type="crash" OR event_type="termination")

🔗 References

📤 Share & Export