CVE-2021-27181

8.8 HIGH

📋 TL;DR

This vulnerability in MDaemon email server allows attackers to perform Cross-Site Request Forgery (CSRF) attacks by fixing anti-CSRF tokens. It affects users of MDaemon Remote Administration who click malicious links, potentially enabling attackers to execute unauthorized actions with the user's privileges. The issue impacts MDaemon versions before 20.0.4.

💻 Affected Systems

Products:
  • MDaemon
Versions: Versions before 20.0.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in the Remote Administration feature; disabling this feature may reduce risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could fully compromise the MDaemon administration interface, leading to unauthorized configuration changes, data theft, or server takeover.

🟠

Likely Case

Attackers trick authenticated administrators into performing unintended actions, such as modifying user accounts or server settings.

🟢

If Mitigated

With proper patching and user awareness, the risk is minimized, though residual risk exists if users interact with malicious links.

🌐 Internet-Facing: HIGH, as Remote Administration exposed to the internet increases attack surface for CSRF exploitation.
🏢 Internal Only: MEDIUM, as internal threats or compromised internal systems could still exploit this via phishing.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (clicking a malicious link) and authentication, making it moderately easy for attackers with social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.0.4

Vendor Advisory: https://www.altn.com/Support/SecurityUpdate/MD011221_MDaemon_EN/

Restart Required: Yes

Instructions:

1. Download MDaemon version 20.0.4 or later from the vendor website. 2. Install the update following vendor instructions. 3. Restart the MDaemon service to apply changes.

🔧 Temporary Workarounds

Disable Remote Administration

windows

Turn off the Remote Administration feature to prevent exploitation via network access.

Navigate to MDaemon settings: Security -> Security Settings -> Remote Administration, and disable it.

Restrict Access to Admin Interface

all

Limit network access to the Remote Administration interface using firewalls or IP whitelisting.

Configure firewall rules to allow only trusted IPs to access the admin port (default 3000).

🧯 If You Can't Patch

  • Implement strict access controls and network segmentation to isolate the MDaemon admin interface.
  • Educate users on phishing risks and enforce policies against clicking untrusted links while authenticated.

🔍 How to Verify

Check if Vulnerable:

Check the MDaemon version in the administration interface or via command: 'mdconfig -v' on Windows.

Check Version:

mdconfig -v

Verify Fix Applied:

Verify the version is 20.0.4 or later and test CSRF protections in the Remote Administration feature.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin login attempts or configuration changes from unexpected IPs.

Network Indicators:

  • HTTP requests to admin endpoints with suspicious referer headers or token mismatches.

SIEM Query:

source="MDaemon" AND (event="admin_action" OR status="403") AND referer NOT CONTAINS "trusted-domain"

🔗 References

📤 Share & Export