CVE-2021-44031

9.8 CRITICAL

📋 TL;DR

CVE-2021-44031 is a critical pre-authentication remote code execution vulnerability in Quest KACE Desktop Authority. Attackers can upload malicious ASP files to execute arbitrary code on affected servers without authentication. Organizations running Desktop Authority versions before 11.2 are affected.

💻 Affected Systems

Products:
  • Quest KACE Desktop Authority
Versions: All versions before 11.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable component is part of the web interface and is accessible by default in standard installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal sensitive data, install malware, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Attackers gain initial foothold on the server, deploy web shells or ransomware, and potentially compromise the entire network through lateral movement.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though the vulnerability still provides initial access that could be detected and contained.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward - attackers can upload ASP files via the vulnerable endpoint without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.2

Vendor Advisory: https://support.quest.com/kace-desktop-authority/kb/336098/quest-response-to-desktop-authority-vulnerabilities-prior-to-11-2

Restart Required: Yes

Instructions:

1. Download Desktop Authority 11.2 or later from Quest support portal. 2. Backup current configuration and data. 3. Run the installer to upgrade to version 11.2+. 4. Restart the Desktop Authority service and IIS.

🔧 Temporary Workarounds

Block access to vulnerable endpoint

windows

Restrict access to /dacomponentui/profiles/profileitems/outlooksettings/Insertimage.aspx via web application firewall or IIS URL filtering

IIS URL Rewrite rule: <rule name="Block CVE-2021-44031" stopProcessing="true"><match url="^dacomponentui/profiles/profileitems/outlooksettings/Insertimage\.aspx" /><action type="AbortRequest" /></rule>

Restrict file uploads to images directory

windows

Configure IIS to block ASP file execution in /images/ directory

<handlers><remove name="ASPClassic" /><add name="ASPClassic" path="*.asp" verb="*" modules="IsapiModule" scriptProcessor="%windir%\system32\inetsrv\asp.dll" resourceType="File" preCondition="bitness64" /></handlers>

🧯 If You Can't Patch

  • Network segmentation: Isolate Desktop Authority servers from internet and restrict internal access to authorized users only
  • Implement strict web application firewall rules to block malicious file uploads and ASP file execution

🔍 How to Verify

Check if Vulnerable:

Check Desktop Authority version in administrative console or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\Quest\Desktop Authority\Version

Check Version:

reg query "HKLM\SOFTWARE\Quest\Desktop Authority" /v Version

Verify Fix Applied:

Verify version is 11.2 or higher and test that ASP file uploads to /images/ directory are blocked

📡 Detection & Monitoring

Log Indicators:

  • IIS logs showing POST requests to /dacomponentui/profiles/profileitems/outlooksettings/Insertimage.aspx with file uploads
  • ASP file creation in /images/ directory
  • Unusual process execution from IIS worker processes

Network Indicators:

  • HTTP POST requests to vulnerable endpoint with file uploads
  • ASP file requests to /images/{GUID}/ directory

SIEM Query:

source="IIS" AND (url="*Insertimage.aspx" OR url="*/images/*.asp")

🔗 References

📤 Share & Export