CVE-2021-41315

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with console access to execute arbitrary operating system commands through improper input sanitization in the SNMP Connectivity utility. It affects Device42 Remote Collector versions before 17.05.01, enabling privilege escalation and remote code execution.

💻 Affected Systems

Products:
  • Device42 Remote Collector
Versions: All versions before 17.05.01
Operating Systems: All platforms running Device42 Remote Collector
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the console application. The vulnerability is in the SNMP Connectivity utility component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/admin privileges, installing persistent backdoors, and pivoting to other systems in the network.

🟠

Likely Case

Unauthorized access to sensitive system data, installation of cryptocurrency miners or ransomware, and lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation and least privilege access controls preventing lateral movement.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires authentication, exposed Remote Collectors could be targeted if credentials are compromised.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain full system control and move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection vulnerabilities are typically easy to weaponize once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 17.05.01

Vendor Advisory: https://blog.device42.com/2021/09/critical-fixes-in-17-05-01/

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download Device42 Remote Collector version 17.05.01 or later from official sources. 3. Stop the Remote Collector service. 4. Install the updated version. 5. Restart the service. 6. Verify functionality.

🔧 Temporary Workarounds

Disable SNMP Connectivity Utility

all

Temporarily disable the vulnerable SNMP Connectivity utility if not required for operations.

# Stop the SNMP service component
# Check Device42 documentation for specific service names

Restrict Console Access

all

Implement strict access controls to limit who can access the Remote Collector console.

# Configure firewall rules to restrict access
# Implement IP whitelisting for console access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Remote Collectors from critical systems
  • Apply principle of least privilege to console access accounts and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check the Remote Collector version via the web interface or configuration files. Versions before 17.05.01 are vulnerable.

Check Version:

# Check version in Device42 web interface or configuration files
# Typically found in /opt/device42/remote_collector/version.txt or similar

Verify Fix Applied:

Verify the version is 17.05.01 or later and test SNMP Connectivity utility functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected process creation from Device42 services

Network Indicators:

  • Unusual outbound connections from Remote Collector systems
  • SNMP traffic to unexpected destinations

SIEM Query:

source="device42" AND (process="cmd.exe" OR process="bash" OR process="sh") AND user="device42_user"

🔗 References

📤 Share & Export