CVE-2021-42545

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to reuse, spoof, or steal user and admin sessions in TopEase Platform due to insufficient session expiration. It affects all TopEase Platform users and administrators running versions 7.1.27 or earlier. Attackers can maintain access to compromised sessions beyond intended time limits.

💻 Affected Systems

Products:
  • Business-DNA Solutions GmbH TopEase Platform
Versions: <= 7.1.27
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations running affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain persistent administrative access, leading to complete system compromise, data theft, privilege escalation, and unauthorized administrative actions.

🟠

Likely Case

Attackers hijack user sessions to access sensitive business data, perform unauthorized actions, or maintain foothold in the system.

🟢

If Mitigated

Limited impact with proper session management controls, but still presents authentication bypass risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires initial session access but session reuse/spoofing is straightforward once obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version > 7.1.27

Vendor Advisory: https://confluence.topease.ch/confluence/display/DOC/Release+Notes

Restart Required: Yes

Instructions:

1. Download latest TopEase Platform version from vendor portal. 2. Backup current installation and data. 3. Apply patch/upgrade following vendor documentation. 4. Restart TopEase services. 5. Verify session expiration is working correctly.

🔧 Temporary Workarounds

Enforce Session Timeout

all

Configure application/web server to enforce strict session timeout policies

Network Segmentation

all

Restrict access to TopEase Platform to trusted networks only

🧯 If You Can't Patch

  • Implement strict network access controls and monitor for unusual session activity
  • Enforce multi-factor authentication and regularly rotate administrative credentials

🔍 How to Verify

Check if Vulnerable:

Check TopEase Platform version in administration interface or configuration files

Check Version:

Check TopEase web interface or consult platform documentation for version command

Verify Fix Applied:

Verify version is >7.1.27 and test session expiration functionality

📡 Detection & Monitoring

Log Indicators:

  • Multiple sessions from same user with unusual timing
  • Session IDs being reused after logout
  • Administrative actions from non-admin IPs

Network Indicators:

  • Unusual session duration patterns
  • Multiple authentication requests without logout events

SIEM Query:

source="topease" AND (event_type="session" AND duration>3600) OR (user="admin" AND source_ip NOT IN trusted_ips)

🔗 References

📤 Share & Export