CVE-2021-4467

N/A Unknown

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to cause denial-of-service by flooding the client communication service on TCP port 2002 with HTTPS requests. The service fails to limit concurrent connections, leading to session identifier exhaustion and collisions that disconnect active client sessions. Organizations using Positive Technologies MaxPatrol 8 or XSpider are affected.

💻 Affected Systems

Products:
  • Positive Technologies MaxPatrol 8
  • Positive Technologies XSpider
Versions: All versions prior to patched release
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the client communication service which runs by default on TCP port 2002.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption preventing all client connections and security scanning operations, potentially leaving systems unmonitored.

🟠

Likely Case

Intermittent service interruptions causing client disconnections and degraded security monitoring capabilities.

🟢

If Mitigated

Minimal impact with proper network segmentation and rate limiting in place.

🌐 Internet-Facing: HIGH - The vulnerable service listens on TCP port 2002 and can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could still disrupt security monitoring services affecting organizational security posture.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only basic scripting to send repeated HTTPS requests to port 2002.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Positive Technologies security advisories for specific patched versions

Vendor Advisory: https://www.ptsecurity.com/

Restart Required: Yes

Instructions:

1. Check Positive Technologies security advisory for specific patch version
2. Download and apply the security update from vendor portal
3. Restart the MaxPatrol/XSpider services
4. Verify service functionality post-update

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to TCP port 2002 to trusted management networks only

# Example firewall rule (Linux iptables)
iptables -A INPUT -p tcp --dport 2002 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 2002 -j DROP

Rate Limiting

linux

Implement connection rate limiting at network perimeter

# Example iptables rate limiting
iptables -A INPUT -p tcp --dport 2002 -m state --state NEW -m recent --set
iptables -A INPUT -p tcp --dport 2002 -m state --state NEW -m recent --update --seconds 60 --hitcount 20 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable service from untrusted networks
  • Deploy network-based intrusion prevention systems with DoS protection rules for port 2002 traffic

🔍 How to Verify

Check if Vulnerable:

Test if TCP port 2002 is accessible and responds to HTTPS requests. Monitor for session exhaustion under load testing.

Check Version:

Check application version in MaxPatrol/XSpider administration interface or configuration files

Verify Fix Applied:

Verify the service version matches patched release and test that repeated connection attempts no longer cause session collisions.

📡 Detection & Monitoring

Log Indicators:

  • Excessive connection attempts to port 2002
  • Multiple session creation failures
  • Unexpected client disconnections

Network Indicators:

  • High volume of HTTPS traffic to port 2002 from single source
  • Abnormal connection patterns to service port

SIEM Query:

source_port=2002 AND (event_count > 1000 per minute) OR (src_ip_count > 50 per minute)

🔗 References

📤 Share & Export