CVE-2021-28123

9.8 CRITICAL

📋 TL;DR

Cohesity DataPlatform versions 6.3 through 6.5.1b contain an undocumented default SSH cryptographic key that provides root access to the underlying Linux system. This vulnerability allows attackers to gain complete control of affected systems. Organizations running vulnerable Cohesity DataPlatform versions are affected.

💻 Affected Systems

Products:
  • Cohesity DataPlatform
Versions: 6.3 prior to 6.3.1g, 6.4 up to 6.4.1c, 6.5.1 through 6.5.1b
Operating Systems: Linux (underlying OS on Cohesity appliances)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The SSH key is embedded in the software and provides root access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Cohesity cluster with root access to all nodes, enabling data theft, destruction, ransomware deployment, and lateral movement to connected systems.

🟠

Likely Case

Unauthorized access to sensitive backup data, configuration tampering, and potential deployment of malware or persistence mechanisms.

🟢

If Mitigated

Limited impact if network segmentation prevents access to management interfaces and strict access controls are in place.

🌐 Internet-Facing: HIGH if SSH management interfaces are exposed to the internet, as exploitation requires only knowledge of the default key.
🏢 Internal Only: HIGH as any internal attacker with network access to SSH ports can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only the default SSH private key and network access to SSH ports (typically 22). The key has been publicly disclosed in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.3.1g, 6.4.1d, 6.5.1c and later

Vendor Advisory: https://github.com/cohesity/SecAdvisory/blob/master/CVE-2021-28123.md

Restart Required: Yes

Instructions:

1. Backup all configurations and data. 2. Upgrade to patched version via Cohesity Helios or CLI. 3. Verify SSH keys have been regenerated. 4. Restart services as required during upgrade.

🔧 Temporary Workarounds

Network Segmentation

linux

Block SSH access to Cohesity management interfaces from untrusted networks

iptables -A INPUT -p tcp --dport 22 -s [TRUSTED_NETWORKS] -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP

SSH Key Rotation

linux

Manually regenerate SSH host keys on all nodes

rm /etc/ssh/ssh_host_*
ssh-keygen -A
systemctl restart sshd

🧯 If You Can't Patch

  • Implement strict network access controls to limit SSH access to Cohesity nodes only from trusted management stations
  • Monitor SSH authentication logs for unauthorized access attempts and implement intrusion detection rules

🔍 How to Verify

Check if Vulnerable:

Check if SSH host key fingerprint matches known vulnerable default keys. Compare with fingerprints published in security advisories.

Check Version:

ssh admin@cohesity-node 'show version' or check via Cohesity Helios dashboard

Verify Fix Applied:

Verify SSH host key fingerprints have changed after patch installation and do not match known vulnerable keys.

📡 Detection & Monitoring

Log Indicators:

  • Successful SSH authentication using default key fingerprints
  • Multiple failed SSH attempts followed by success
  • Unauthorized commands executed as root

Network Indicators:

  • SSH connections from unexpected source IPs
  • SSH brute force patterns targeting Cohesity nodes

SIEM Query:

source="auth.log" AND "Accepted publickey for root" AND (fingerprint="known_vulnerable_fingerprint" OR user="root")

🔗 References

📤 Share & Export