CVE-2021-40386
📋 TL;DR
CVE-2021-40386 is a critical remote code execution vulnerability in Kaseya Unitrends Client/Agent software. Attackers can exploit this to execute arbitrary code on affected systems, potentially gaining full control. Organizations using Kaseya Unitrends backup solutions through version 10.5.5 are affected.
💻 Affected Systems
- Kaseya Unitrends Client
- Kaseya Unitrends Agent
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to deploy ransomware, steal sensitive backup data, and pivot to other network systems.
Likely Case
Attackers gain initial foothold on backup servers, potentially leading to data exfiltration, ransomware deployment, or lateral movement within the network.
If Mitigated
Limited impact with proper network segmentation and access controls, though backup systems remain at risk of compromise.
🎯 Exploit Status
This vulnerability was actively exploited in the wild during the Kaseya supply chain attack in July 2021.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.5.5 and later versions
Vendor Advisory: https://helpdesk.kaseya.com/hc/en-gb/articles/4403440684689-Important-Notice-July-2nd-2021
Restart Required: Yes
Instructions:
1. Immediately update all Kaseya Unitrends installations to version 10.5.5 or later. 2. Follow Kaseya's emergency patch instructions. 3. Restart affected services after patching.
🔧 Temporary Workarounds
Network Isolation
allIsolate Kaseya Unitrends servers from internet access and restrict internal network access.
Configure firewall rules to block inbound connections to Unitrends ports (typically 80, 443, 1743)
Service Disablement
allTemporarily disable Unitrends services if patching cannot be immediately performed.
Windows: sc stop "Unitrends Agent"
Linux: systemctl stop unitrends-agent
🧯 If You Can't Patch
- Immediately isolate affected systems from all network access
- Implement strict network segmentation and monitor for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check Unitrends version in administration console or via agent status commands.
Check Version:
Windows: wmic product where name="Unitrends" get version
Linux: dpkg -l | grep unitrends or rpm -qa | grep unitrends
Verify Fix Applied:
Verify version is 10.5.5 or later and check for successful service restart.
📡 Detection & Monitoring
Log Indicators:
- Unusual process execution from Unitrends directories
- Failed authentication attempts followed by successful exploitation
- Unexpected network connections from Unitrends systems
Network Indicators:
- Unusual outbound connections from backup servers
- Traffic to known malicious IPs from Unitrends systems
- Anomalous port activity on Unitrends default ports
SIEM Query:
source="unitrends*" AND (event_type="process_execution" OR event_type="network_connection") AND (process_path="*\Unitrends\*" OR dest_port IN (80, 443, 1743))