CVE-2021-26705
📋 TL;DR
This vulnerability allows unauthenticated attackers to invoke sensitive RMI methods in SquareBox CatDV Server, which can be used to generate valid authentication tokens. These tokens then enable administrative access, including password hash disclosure. All CatDV Server installations through version 9.2 are affected.
💻 Affected Systems
- SquareBox CatDV Server
📦 What is this software?
Catdv by Squarebox
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with administrative access, password hash theft, and potential lateral movement within the network.
Likely Case
Unauthorized administrative access leading to data theft, system manipulation, and privilege escalation.
If Mitigated
Limited impact if proper network segmentation and authentication controls prevent RMI method access.
🎯 Exploit Status
Exploit code is publicly available and requires no authentication, making exploitation trivial.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.2.1 or later
Vendor Advisory: https://www.squarebox.com/
Restart Required: Yes
Instructions:
1. Download and install CatDV Server version 9.2.1 or later from SquareBox. 2. Stop the CatDV Server service. 3. Apply the update. 4. Restart the CatDV Server service.
🔧 Temporary Workarounds
Network Access Control
allRestrict network access to CatDV Server RMI ports (typically 1099) to trusted IP addresses only.
Firewall Blocking
allBlock inbound connections to CatDV Server RMI ports from untrusted networks.
🧯 If You Can't Patch
- Isolate CatDV Server on a segmented network with strict access controls
- Implement network monitoring and alerting for RMI method invocation attempts
🔍 How to Verify
Check if Vulnerable:
Check CatDV Server version in administration interface or configuration files. Versions 9.2 and earlier are vulnerable.
Check Version:
Check CatDV Server web interface or consult server configuration files for version information.
Verify Fix Applied:
Verify installation of version 9.2.1 or later and test that unauthenticated RMI method calls are rejected.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated RMI method calls
- getConnections method invocation from untrusted sources
- Authentication token generation without proper credentials
Network Indicators:
- RMI traffic to port 1099 from unexpected sources
- Unusual administrative task execution patterns
SIEM Query:
source="catdv" AND (method="getConnections" OR auth_token_generated) AND user="anonymous"