CVE-2021-43033

9.8 CRITICAL

📋 TL;DR

CVE-2021-43033 is a critical remote code execution vulnerability in Kaseya Unitrends Backup Appliance's bpserverd daemon that allows attackers to execute arbitrary commands as root. The vulnerability affects systems running vulnerable versions of the appliance, allowing complete system compromise. Organizations using Kaseya Unitrends Backup Appliance before version 10.5.5 are affected.

💻 Affected Systems

Products:
  • Kaseya Unitrends Backup Appliance
Versions: Versions before 10.5.5
Operating Systems: Linux-based appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: The bpserverd daemon runs with root privileges by default, making exploitation particularly dangerous.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root privileges, data exfiltration, ransomware deployment, and lateral movement to other systems.

🟠

Likely Case

Remote code execution leading to data theft, credential harvesting, and installation of persistent backdoors.

🟢

If Mitigated

Limited impact if network segmentation, strict access controls, and monitoring are in place to detect exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit write-ups and proof-of-concept code exist, making this easily exploitable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.5.5

Vendor Advisory: https://helpdesk.kaseya.com/hc/en-gb/articles/4412762258961

Restart Required: Yes

Instructions:

1. Backup all configurations and data. 2. Download and install version 10.5.5 from Kaseya support portal. 3. Apply the update following vendor instructions. 4. Restart the appliance to complete installation.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict network access to the bpserverd service (default port 1743) to only trusted management networks.

iptables -A INPUT -p tcp --dport 1743 -s TRUSTED_IP_RANGE -j ACCEPT
iptables -A INPUT -p tcp --dport 1743 -j DROP

🧯 If You Can't Patch

  • Immediately isolate the appliance from internet access and restrict to internal management networks only.
  • Implement strict network monitoring and IDS/IPS rules to detect exploitation attempts on port 1743.

🔍 How to Verify

Check if Vulnerable:

Check the appliance version via web interface or SSH: cat /etc/unitrends-release

Check Version:

cat /etc/unitrends-release

Verify Fix Applied:

Verify version is 10.5.5 or later and check that bpserverd service is running with updated binaries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from bpserverd
  • Suspicious commands in system logs
  • Failed authentication attempts to bpserverd

Network Indicators:

  • Unusual traffic to port 1743 from untrusted sources
  • Large data transfers from appliance

SIEM Query:

source="bpserverd.log" AND (process_execution OR command_injection)

🔗 References

📤 Share & Export