CVE-2021-32582

7.5 HIGH

📋 TL;DR

This is a blind SQL injection vulnerability in ConnectWise Automate's core agent inventory communication. Attackers can exploit it to extract sensitive database information, including administrative credentials, by sending crafted monitor status responses. Organizations using ConnectWise Automate versions before 2021.5 are affected.

💻 Affected Systems

Products:
  • ConnectWise Automate
Versions: All versions before 2021.5
Operating Systems: Windows Server (primary deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the core agent inventory communication mechanism which is enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise leading to administrative credential theft, lateral movement within the network, and complete system takeover.

🟠

Likely Case

Extraction of sensitive database information including credentials, configuration data, and client information.

🟢

If Mitigated

Limited information disclosure if proper input validation and WAF rules are in place.

🌐 Internet-Facing: HIGH - The vulnerability affects agent communication which often occurs over internet-facing interfaces.
🏢 Internal Only: HIGH - Even internally, the vulnerability can be exploited by compromised agents or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Blind SQL injection requires more sophisticated exploitation but is well-documented in security research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021.5 or later

Vendor Advisory: https://home.connectwise.com/securityBulletin/609a9dd75cb8450001e85369

Restart Required: Yes

Instructions:

1. Backup your Automate database and configuration. 2. Download ConnectWise Automate 2021.5 or later from the ConnectWise portal. 3. Run the installer on your Automate server. 4. Follow the upgrade wizard instructions. 5. Restart the Automate services after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Automate server from untrusted networks and implement strict firewall rules.

Web Application Firewall

all

Deploy WAF with SQL injection protection rules to block malicious payloads.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Automate server from internet and untrusted networks
  • Deploy a web application firewall with SQL injection detection and prevention rules

🔍 How to Verify

Check if Vulnerable:

Check the Automate version in the web interface under Help > About or review the installed version in Programs and Features.

Check Version:

In Automate web interface: Help > About, or on Windows: wmic product where name="ConnectWise Automate" get version

Verify Fix Applied:

Verify the version shows 2021.5 or higher and test agent communication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed monitor status responses
  • Suspicious agent communication patterns

Network Indicators:

  • Unusual outbound database connections from Automate server
  • SQL error messages in network traffic
  • Patterns of crafted HTTP/S requests to agent endpoints

SIEM Query:

source="automate_logs" AND (message="*SQL*" OR message="*injection*" OR message="*monitor status*" AND status="failed")

🔗 References

📤 Share & Export