CVE-2021-44029

9.8 CRITICAL

📋 TL;DR

CVE-2021-44029 is a remote code execution vulnerability in Quest KACE Desktop Authority versions before 11.2, caused by insecure deserialization in the RadAsyncUpload function of ASP.NET AJAX. Attackers can exploit this to execute arbitrary code on affected systems when encryption keys are known (often through previous vulnerabilities like CVE-2017-11317). Organizations running vulnerable versions of Quest KACE Desktop Authority are affected.

💻 Affected Systems

Products:
  • Quest KACE Desktop Authority
Versions: All versions before 11.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Exploitation requires knowledge of encryption keys, which may be obtained through other vulnerabilities like CVE-2017-11317 or CVE-2017-11357. More current ASP.NET AJAX versions have type whitelisting enabled by default which prevents exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code with the privileges of the application service account, potentially leading to data theft, lateral movement, or complete system takeover.

🟠

Likely Case

Remote code execution leading to installation of malware, backdoors, or ransomware on affected systems, with potential for credential harvesting and network reconnaissance.

🟢

If Mitigated

No impact if systems are patched to version 11.2 or later, or if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is relatively straightforward once encryption keys are obtained. The vulnerability leverages known deserialization patterns in ASP.NET AJAX.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.2 and later

Vendor Advisory: https://support.quest.com/kace-desktop-authority/kb/336098/quest-response-to-desktop-authority-vulnerabilities-prior-to-11-2

Restart Required: Yes

Instructions:

1. Download Quest KACE Desktop Authority version 11.2 or later from the Quest support portal. 2. Backup current configuration and data. 3. Run the installer to upgrade to the patched version. 4. Restart the application services and verify functionality.

🔧 Temporary Workarounds

Disable RadAsyncUpload handler

windows

Remove or disable the vulnerable RadAsyncUpload handler in web.config to prevent exploitation

Edit web.config file and remove or comment out the RadAsyncUpload handler registration

Network segmentation and access controls

all

Restrict network access to the Quest KACE Desktop Authority web interface

Configure firewall rules to limit access to only trusted IP addresses

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from untrusted networks
  • Deploy web application firewall (WAF) rules to block deserialization attacks and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Quest KACE Desktop Authority in the application interface or installation directory

Check Version:

Check the application version in the Quest KACE Desktop Authority admin interface or examine the installed program version in Windows Programs and Features

Verify Fix Applied:

Verify that version 11.2 or later is installed and that the RadAsyncUpload handler has been updated

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to RadAsyncUpload handlers
  • Deserialization errors in application logs
  • Unexpected process creation from the application service account

Network Indicators:

  • HTTP requests containing serialized objects to RadAsyncUpload endpoints
  • Unusual outbound connections from the application server

SIEM Query:

source="web_server_logs" AND (url="*RadAsyncUpload*" OR method="POST" AND status="200" AND size>100000)

🔗 References

📤 Share & Export