CVE-2021-26471
📋 TL;DR
CVE-2021-26471 is an unauthenticated remote code execution vulnerability in Vembu backup products. Attackers can execute arbitrary shell commands via the /sgwebservice_o.php API endpoint without authentication. This affects VembuBDR and VembuOffsiteDR installations before version 4.2.0.1.
💻 Affected Systems
- VembuBDR
- VembuOffsiteDR
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to install malware, exfiltrate data, pivot to other systems, or deploy ransomware across the network.
Likely Case
Attackers gain initial foothold, deploy backdoors, steal backup data, and potentially compromise the entire backup infrastructure.
If Mitigated
Limited impact due to network segmentation, but still exposes the backup server to potential compromise.
🎯 Exploit Status
Simple HTTP POST request with command injection payload. Multiple public exploit scripts and Metasploit modules exist.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.2.0.1
Vendor Advisory: https://help.vembu.com/vembu-bdr-suite/vembu-bdr-suite-4-2-0-1-release-notes/
Restart Required: Yes
Instructions:
1. Download Vembu BDR Suite 4.2.0.1 from Vembu website. 2. Backup current configuration. 3. Run installer and follow upgrade wizard. 4. Restart Vembu services after installation.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict access to Vembu server ports (typically 6060) to trusted IPs only.
iptables -A INPUT -p tcp --dport 6060 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 6060 -j DROP
Web Server Blocking
allBlock access to the vulnerable endpoint at web server level.
<Location /sgwebservice_o.php>
Order deny,allow
Deny from all
</Location>
🧯 If You Can't Patch
- Immediately isolate the Vembu server from internet access and restrict internal network access
- Implement strict network segmentation and monitor all traffic to/from the Vembu server
🔍 How to Verify
Check if Vulnerable:
Check if HTTP POST to http://[server]:6060/sgwebservice_o.php with command parameter returns system information or executes commands.
Check Version:
Check Vembu web interface dashboard or run: grep 'Version' /opt/vembu/bdrserver/conf/version.txt (Linux) or check Windows Services for Vembu version
Verify Fix Applied:
Verify version is 4.2.0.1 or later and test that the same exploit attempt fails with proper authentication error.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /sgwebservice_o.php with command parameter
- Unusual process execution from web server user
- Failed authentication attempts followed by successful command execution
Network Indicators:
- HTTP POST to port 6060 with command injection patterns in payload
- Outbound connections from Vembu server to suspicious IPs
SIEM Query:
source="vembu.log" AND "sgwebservice_o.php" AND "command=" OR destination_port=6060 AND http_method=POST AND url_path="/sgwebservice_o.php"
🔗 References
- https://csirt.divd.nl/2021/05/11/Vembu-zero-days/
- https://csirt.divd.nl/cases/DIVD-2020-00011/
- https://csirt.divd.nl/cves/CVE-2021-26471/
- https://www.wbsec.nl/vembu
- https://csirt.divd.nl/2021/05/11/Vembu-zero-days/
- https://csirt.divd.nl/cases/DIVD-2020-00011/
- https://csirt.divd.nl/cves/CVE-2021-26471/
- https://www.wbsec.nl/vembu