CVE-2021-35002

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to upload malicious files through email attachments in BMC Track-It!, leading to remote code execution. Attackers can execute arbitrary code with the privileges of the service account. Organizations using vulnerable versions of BMC Track-It! are affected.

💻 Affected Systems

Products:
  • BMC Track-It!
Versions: Versions prior to 20.21.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to exploit, but default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal sensitive data, deploy ransomware, or establish persistent backdoors.

🟠

Likely Case

Data exfiltration, lateral movement within the network, and installation of malware or cryptocurrency miners.

🟢

If Mitigated

Limited impact with proper network segmentation, file upload restrictions, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Authentication required but exploit is straightforward once authenticated. ZDI has published technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.21.1 and later

Vendor Advisory: https://community.bmc.com/s/article/Security-vulnerabilities-patched-in-Track-It

Restart Required: Yes

Instructions:

1. Download Track-It! version 20.21.1 or later from BMC support portal. 2. Backup current installation and data. 3. Run the installer with administrative privileges. 4. Restart the Track-It! service and verify functionality.

🔧 Temporary Workarounds

Restrict File Upload Types

windows

Configure Track-It! to only accept specific safe file extensions for email attachments.

Implement Web Application Firewall

all

Deploy WAF rules to block malicious file uploads and suspicious patterns.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Track-It! servers from critical systems
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious file uploads and execution

🔍 How to Verify

Check if Vulnerable:

Check Track-It! version in administration console or via installed programs list in Windows.

Check Version:

Check Track-It! About dialog or Windows Programs and Features

Verify Fix Applied:

Verify version is 20.21.1 or later and test email attachment functionality with restricted file types.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads via email attachments
  • Execution of unexpected processes from upload directories
  • Failed authentication attempts followed by successful uploads

Network Indicators:

  • HTTP POST requests with file uploads to Track-It! email endpoints
  • Outbound connections from Track-It! server to unknown IPs

SIEM Query:

source="track-it-logs" AND (event="file_upload" AND file_extension NOT IN ("pdf","doc","txt")) OR process_execution FROM upload_directory

🔗 References

📤 Share & Export