CVE-2021-27654

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass local authentication by exploiting forgotten password reset functionality for local accounts. It affects Pega Platform systems with local authentication enabled, potentially enabling unauthorized access to sensitive data and administrative functions.

💻 Affected Systems

Products:
  • Pega Platform
Versions: Pega Platform versions 8.5.x and 8.6.x
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using local authentication. Systems using external authentication providers (LDAP, SSO) are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain administrative privileges, access sensitive data, modify configurations, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to user accounts leading to data theft, privilege escalation, and potential business process manipulation.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the password reset functionality but does not require authentication. Attack complexity is low once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Pega Platform 8.5.4 and 8.6.2

Vendor Advisory: https://collaborate.pega.com/discussion/pega-security-advisory-c21

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Pega Collaboration Portal. 2. Apply the patch following Pega's standard patching procedures. 3. Restart the Pega Platform services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Disable Local Authentication

all

Configure Pega Platform to use external authentication providers instead of local authentication

Configure authentication to use LDAP, Active Directory, or SSO providers

Restrict Access to Password Reset

all

Apply network controls to limit access to password reset functionality

Configure firewall rules to restrict access to /prweb/PRRestService/* endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Pega systems from untrusted networks
  • Enable detailed logging and monitoring for authentication and password reset events

🔍 How to Verify

Check if Vulnerable:

Check if using Pega Platform 8.5.x or 8.6.x with local authentication enabled and version is below 8.5.4 or 8.6.2

Check Version:

Check Pega Platform version in System Management Application or via PRPC:Engine API

Verify Fix Applied:

Verify Pega Platform version is 8.5.4 or higher for 8.5.x branch, or 8.6.2 or higher for 8.6.x branch

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed password reset attempts from single IP
  • Successful password reset for privileged accounts
  • Unusual authentication patterns

Network Indicators:

  • HTTP requests to /prweb/PRRestService/v1/PasswordReset from unusual locations
  • Burst of authentication-related traffic

SIEM Query:

source="pega_logs" AND (event_type="password_reset" OR event_type="authentication") AND status="success" AND user_role="admin"

🔗 References

📤 Share & Export