CVE-2021-3341

7.5 HIGH

📋 TL;DR

A path traversal vulnerability in DH2i's DxWebEngine component allows attackers to read arbitrary files on the host system via crafted HTTP requests. This affects DxEnterprise and DxOdyssey for Windows versions 19.5 through 20.x before 20.0.219.0. Attackers can potentially access sensitive system files without authentication.

💻 Affected Systems

Products:
  • DH2i DxEnterprise
  • DH2i DxOdyssey
Versions: 19.5 through 20.x before 20.0.219.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of these products. The DxWebEngine component must be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading of sensitive files like passwords, configuration files, or SSH keys, potentially leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive application configuration files, database credentials, or system information that could facilitate further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the vulnerable HTTP service but no authentication. Path traversal attacks are well-understood and relatively simple to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.0.219.0 or later

Vendor Advisory: https://clients.dh2i.com/Support/Article.aspx?ID=2963454

Restart Required: Yes

Instructions:

1. Download the latest version from DH2i's official website. 2. Stop all DxEnterprise/DxOdyssey services. 3. Run the installer to upgrade to version 20.0.219.0 or later. 4. Restart services and verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

windows

Restrict network access to DxWebEngine HTTP service using firewall rules to only allow trusted IP addresses.

New-NetFirewallRule -DisplayName "Block DxWebEngine External" -Direction Inbound -Protocol TCP -LocalPort 80,443 -RemoteAddress Any -Action Block

Disable DxWebEngine

windows

Temporarily disable the DxWebEngine component if not required for operations.

Stop-Service DxWebEngine
Set-Service DxWebEngine -StartupType Disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from untrusted networks
  • Deploy web application firewall (WAF) rules to detect and block path traversal patterns in HTTP requests

🔍 How to Verify

Check if Vulnerable:

Check the installed version of DxEnterprise/DxOdyssey. If version is between 19.5 and 20.x and less than 20.0.219.0, the system is vulnerable.

Check Version:

Get-ItemProperty HKLM:\Software\DH2i\DxEnterprise\* | Select-Object Version

Verify Fix Applied:

Verify the version is 20.0.219.0 or later and test that path traversal attempts to access system files are blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' or '..\' patterns in URLs
  • Access to unusual file paths via web service logs
  • Failed file access attempts to sensitive system directories

Network Indicators:

  • HTTP requests with encoded path traversal sequences (%2e%2e%2f, ..%2f)
  • Unusual file extensions being requested via HTTP

SIEM Query:

source="web_server_logs" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*")

🔗 References

📤 Share & Export