CVE-2021-38137
📋 TL;DR
CVE-2021-38137 is an improper authorization vulnerability in Corero SecureWatch Managed Services where swa-monitor and cns-monitor users can perform actions beyond their assigned privileges. This allows privilege escalation within the management interface. Organizations using Corero SecureWatch Managed Services version 9.7.2.0020 are affected.
💻 Affected Systems
- Corero SecureWatch Managed Services
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated low-privilege user could gain administrative control over the SecureWatch platform, potentially modifying DDoS protection rules, disabling security controls, or accessing sensitive network traffic data.
Likely Case
Authorized users with monitoring roles could perform administrative actions they shouldn't have access to, potentially disrupting DDoS protection configurations or accessing privileged information.
If Mitigated
With proper network segmentation and monitoring, unauthorized privilege escalation attempts would be detected and contained before causing significant damage.
🎯 Exploit Status
Exploitation requires valid user credentials for swa-monitor or cns-monitor roles. The vulnerability is in authorization logic, making exploitation straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Contact Corero for patched version
Vendor Advisory: https://www.corero.com/blog/data-sheets-corero-securewatch-managed-services/
Restart Required: Yes
Instructions:
1. Contact Corero support for the security patch
2. Schedule maintenance window
3. Apply patch following Corero's instructions
4. Restart affected services
5. Verify authorization controls are functioning correctly
🔧 Temporary Workarounds
Temporary Role Restriction
allTemporarily restrict or disable swa-monitor and cns-monitor user accounts until patching can be completed
# Contact Corero support for specific account management commands
Network Access Control
linuxRestrict network access to the SecureWatch management interface to only authorized administrative networks
# Configure firewall rules to limit management interface access
# Example: iptables -A INPUT -p tcp --dport [management_port] -s [trusted_network] -j ACCEPT
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the SecureWatch management interface from general user networks
- Enhance monitoring and alerting for privilege escalation attempts and unusual administrative actions
🔍 How to Verify
Check if Vulnerable:
Check if running Corero SecureWatch Managed Services version 9.7.2.0020 and verify if swa-monitor/cns-monitor users exist
Check Version:
# Contact Corero support for version checking commands specific to the appliance
Verify Fix Applied:
After patching, test that swa-monitor and cns-monitor users cannot perform administrative actions beyond their role permissions
📡 Detection & Monitoring
Log Indicators:
- Unauthorized privilege escalation attempts
- swa-monitor or cns-monitor users performing administrative actions
- Failed authorization checks for these specific roles
Network Indicators:
- Unusual administrative traffic from non-admin network segments
- Multiple failed login attempts followed by successful administrative actions
SIEM Query:
source="corero_securewatch" AND (user_role="swa-monitor" OR user_role="cns-monitor") AND action="admin_*"
🔗 References
- https://www.corero.com/blog/data-sheets-corero-securewatch-managed-services/
- https://www.shielder.it/advisories/corero_secure_watch_managed_services-multiple-broken-access-control/
- https://www.corero.com/blog/data-sheets-corero-securewatch-managed-services/
- https://www.shielder.it/advisories/corero_secure_watch_managed_services-multiple-broken-access-control/