CVE-2021-36124

9.8 CRITICAL

📋 TL;DR

CVE-2021-36124 is an authentication bypass vulnerability in Echo ShareCare 8.15.5 that allows unauthenticated attackers to access sensitive resources without credentials. This affects all systems running the vulnerable Echo ShareCare version, potentially exposing them to SQL injection and other attacks through unprotected endpoints.

💻 Affected Systems

Products:
  • Echo ShareCare
Versions: 8.15.5
Operating Systems: All platforms running Echo ShareCare
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Echo ShareCare 8.15.5 are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through SQL injection leading to data exfiltration, privilege escalation, or remote code execution.

🟠

Likely Case

Unauthorized access to sensitive data and potential SQL injection attacks against the database.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls are implemented.

🌐 Internet-Facing: HIGH - Directly accessible from internet without authentication requirements.
🏢 Internal Only: HIGH - Internal attackers can exploit without credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill due to public proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.15.6 or later

Vendor Advisory: https://github.com/atredispartners/advisories/blob/master/ATREDIS-2021-0001.md

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download and install Echo ShareCare version 8.15.6 or later from official vendor. 3. Restart the Echo ShareCare service. 4. Verify authentication is required for all sensitive endpoints.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict network access to Echo ShareCare using firewall rules

iptables -A INPUT -p tcp --dport [Echo_ShareCare_port] -s [trusted_network] -j ACCEPT
iptables -A INPUT -p tcp --dport [Echo_ShareCare_port] -j DROP

Web Application Firewall

all

Implement WAF rules to block unauthenticated access to sensitive paths

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Echo ShareCare from untrusted networks
  • Deploy a reverse proxy with authentication requirements for all sensitive endpoints

🔍 How to Verify

Check if Vulnerable:

Attempt to access sensitive Echo ShareCare endpoints without authentication. If accessible, system is vulnerable.

Check Version:

Check Echo ShareCare administration interface or configuration files for version information

Verify Fix Applied:

Verify authentication is required for all previously accessible sensitive endpoints and test for SQL injection vulnerabilities.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to sensitive endpoints
  • SQL error messages in application logs
  • Unusual database queries from application user

Network Indicators:

  • HTTP requests to sensitive endpoints without authentication headers
  • SQL injection patterns in HTTP requests

SIEM Query:

source="echo_sharecare" AND (url_path="/sensitive/*" AND NOT auth_success="true")

🔗 References

📤 Share & Export