CVE-2021-27198
📋 TL;DR
CVE-2021-27198 allows unauthenticated attackers to upload arbitrary files and execute code remotely on Visualware MyConnection Server installations. This affects all systems running versions before 11.1a. Since the Windows version runs with SYSTEM privileges, successful exploitation grants full administrative control.
💻 Affected Systems
- Visualware MyConnection Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM/root privileges, allowing attackers to install malware, steal data, pivot to other systems, or create persistent backdoors.
Likely Case
Remote code execution leading to web shell installation, credential theft, and lateral movement within the network.
If Mitigated
Limited impact if proper network segmentation and least-privilege principles are implemented, though initial compromise would still be possible.
🎯 Exploit Status
Exploit code is publicly available and requires no authentication. Attackers can upload malicious files via the myspeed/sf?filename= URI to achieve RCE.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 11.1a and later
Vendor Advisory: https://myconnectionserver.visualware.com/support/newrelease.html
Restart Required: Yes
Instructions:
1. Download version 11.1a or later from the vendor website. 2. Backup current configuration. 3. Stop the MyConnection Server service. 4. Install the updated version. 5. Restart the service.
🔧 Temporary Workarounds
Block vulnerable endpoint
linuxBlock access to the myspeed/sf endpoint via web application firewall or network filtering
iptables -A INPUT -p tcp --dport [MyConnection_PORT] -m string --string "myspeed/sf" --algo bm -j DROP
Network segmentation
allRestrict network access to MyConnection Server to only trusted IP addresses
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port protocol="tcp" port="PORT" accept'
🧯 If You Can't Patch
- Immediately isolate affected systems from internet and restrict internal network access
- Implement strict file upload validation and monitoring for the myspeed/sf endpoint
🔍 How to Verify
Check if Vulnerable:
Check if the server responds to requests at /myspeed/sf?filename=test with file upload capabilities. Version check is more reliable.
Check Version:
Check the web interface admin panel or service logs for version information. On Windows: Check installed programs list. On Linux: Check package manager or installation directory.
Verify Fix Applied:
Verify the installed version is 11.1a or later and test that the myspeed/sf endpoint no longer accepts arbitrary file uploads.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing 'myspeed/sf?filename=' patterns
- Unusual file upload activities to the web service
- Java process spawning unexpected child processes
Network Indicators:
- POST requests to /myspeed/sf endpoint with file uploads
- Unusual outbound connections from the MyConnection Server host
SIEM Query:
source="web_logs" AND uri="*myspeed/sf*" AND (method="POST" OR params="*filename=*")
🔗 References
- http://packetstormsecurity.com/files/161571/VisualWare-MyConnection-Server-11.x-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2021/Feb/81
- https://myconnectionserver.visualware.com/download.html
- https://myconnectionserver.visualware.com/support/newrelease.html
- https://www.securifera.com/advisories/cve-2021-27198/
- http://packetstormsecurity.com/files/161571/VisualWare-MyConnection-Server-11.x-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2021/Feb/81
- https://myconnectionserver.visualware.com/download.html
- https://myconnectionserver.visualware.com/support/newrelease.html
- https://www.securifera.com/advisories/cve-2021-27198/