CVE-2021-27236

9.8 CRITICAL

📋 TL;DR

This vulnerability in Mutare Voice (EVM) allows unauthenticated attackers to include local files via getfile.asp, which can be escalated to remote code execution. It affects Mutare Voice 3.x versions before 3.3.8. Organizations running vulnerable versions are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Mutare Voice (EVM)
Versions: 3.x before 3.3.8
Operating Systems: Windows (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: The getfile.asp endpoint is typically accessible by default in affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative privileges, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Unauthenticated remote code execution leading to web server compromise, data theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation and web application firewalls are in place, though the vulnerability remains exploitable.

🌐 Internet-Facing: HIGH - The vulnerability is unauthenticated and can be exploited remotely without any credentials.
🏢 Internal Only: HIGH - Even internally, the vulnerability requires no authentication and can be exploited by any internal user or compromised device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Local file inclusion vulnerabilities are commonly weaponized for RCE through techniques like log poisoning or file upload abuse.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.8 or later

Vendor Advisory: https://www.mutare.com/security-adv-mutare-2021-001-mutare-voice/

Restart Required: Yes

Instructions:

1. Download Mutare Voice version 3.3.8 or later from the vendor. 2. Backup current configuration and data. 3. Install the updated version following vendor instructions. 4. Restart the Mutare Voice service.

🔧 Temporary Workarounds

Block getfile.asp Access

all

Restrict access to the vulnerable getfile.asp endpoint using web server configuration or firewall rules.

# For IIS: Use URL Rewrite to block /getfile.asp
# For Apache: Use mod_rewrite to deny access to getfile.asp

Network Segmentation

all

Isolate Mutare Voice servers from internet access and restrict internal network access.

# Configure firewall rules to limit inbound connections to Mutare Voice

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can reach the Mutare Voice server
  • Deploy a web application firewall (WAF) with rules to detect and block LFI exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check the Mutare Voice version in the administration interface or by examining installed files. Versions 3.x before 3.3.8 are vulnerable.

Check Version:

Check the Mutare Voice web interface or installation directory for version information

Verify Fix Applied:

Verify the version is 3.3.8 or later in the administration interface and test that getfile.asp no longer accepts malicious file inclusion parameters.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to getfile.asp with suspicious parameters
  • Multiple failed attempts followed by successful file inclusion
  • Web server logs showing access to system files

Network Indicators:

  • HTTP requests to getfile.asp with directory traversal patterns (../)
  • Unusual outbound connections from Mutare Voice server

SIEM Query:

source="mutare_voice_logs" AND uri="*getfile.asp*" AND (param="*../*" OR param="*..\\*")

🔗 References

📤 Share & Export