CVE-2021-43394

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass LDAP authentication in Unisys OS 2200 Messaging Integration Services due to improper password validation. Attackers could gain unauthorized access to systems running affected versions. Organizations using Unisys OS 2200 NTSI versions 7R3B IC3/IC4, 7R3C, or 7R3D are affected.

💻 Affected Systems

Products:
  • Unisys OS 2200 Messaging Integration Services (NTSI)
Versions: 7R3B IC3, 7R3B IC4, 7R3C, 7R3D
Operating Systems: Unisys OS 2200
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with LDAP authentication configured for NTSI services.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to access sensitive data, execute arbitrary code, and pivot to other systems in the network.

🟠

Likely Case

Unauthorized access to messaging services, potential data exfiltration, and privilege escalation within the affected system.

🟢

If Mitigated

Limited impact with proper network segmentation, monitoring, and authentication controls in place.

🌐 Internet-Facing: HIGH if exposed to internet, as authentication bypass can be exploited remotely without credentials.
🏢 Internal Only: HIGH even internally, as attackers with network access can bypass authentication controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically have low exploitation complexity once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Unisys support for specific patch information

Vendor Advisory: https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=66

Restart Required: Yes

Instructions:

1. Contact Unisys support for appropriate patches. 2. Apply patches following Unisys documentation. 3. Restart affected services. 4. Verify LDAP authentication is functioning correctly.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from untrusted networks and limit access to authorized users only.

Enhanced Monitoring

all

Implement strict monitoring of authentication attempts and LDAP queries on affected systems.

🧯 If You Can't Patch

  • Implement network-level authentication controls (firewall rules, VPN access only)
  • Deploy additional authentication layers (multi-factor authentication, certificate-based auth)

🔍 How to Verify

Check if Vulnerable:

Check NTSI version using Unisys administrative tools and compare against affected versions.

Check Version:

Use Unisys OS 2200 system administration commands specific to NTSI version checking.

Verify Fix Applied:

Test LDAP authentication with invalid credentials to ensure proper validation occurs.

📡 Detection & Monitoring

Log Indicators:

  • Failed LDAP authentication attempts followed by successful access
  • Unusual authentication patterns
  • LDAP query errors

Network Indicators:

  • Unexpected connections to NTSI services
  • LDAP traffic from unauthorized sources

SIEM Query:

source="ntsi" AND (event_type="authentication" AND result="success") AND (previous_event="authentication_failure" within 5 minutes)

🔗 References

📤 Share & Export