CVE-2021-45389

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication in StarWind SAN/NAS and Command Center by injecting self-signed JWT tokens into the update manager. Successful exploitation enables privilege escalation, potentially giving attackers administrative control. This affects StarWind SAN and NAS build 1578 and StarWind Command Center build 6864.

💻 Affected Systems

Products:
  • StarWind SAN and NAS
  • StarWind Command Center
Versions: StarWind SAN and NAS build 1578, StarWind Command Center build 6864
Operating Systems: Windows-based StarWind appliances
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific builds; other versions may be vulnerable if similar JWT implementation exists.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing data theft, system manipulation, and persistence establishment.

🟠

Likely Case

Unauthorized administrative access leading to configuration changes, data access, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially containing the breach to isolated systems.

🌐 Internet-Facing: HIGH if exposed to internet, as authentication bypass enables direct exploitation without credentials.
🏢 Internal Only: HIGH due to authentication bypass allowing privilege escalation from any network position.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerability typically requires minimal technical skill to exploit once the method is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest versions beyond affected builds

Vendor Advisory: https://www.starwindsoftware.com/security/sw-20211215-0001/

Restart Required: Yes

Instructions:

1. Download latest StarWind software from vendor portal. 2. Backup configurations. 3. Apply update following vendor documentation. 4. Restart services/systems as required.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to StarWind management interfaces to trusted IPs only

Configure firewall rules to allow only specific source IPs to StarWind management ports

Update Manager Access Control

all

Disable or restrict access to update manager endpoints if not required

Configure application firewall or web server to block /update-manager paths

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate StarWind systems from untrusted networks
  • Monitor for unusual authentication attempts and JWT token manipulation in logs

🔍 How to Verify

Check if Vulnerable:

Check StarWind software version in administration interface; vulnerable if running build 1578 (SAN/NAS) or 6864 (Command Center)

Check Version:

Check via StarWind management interface or consult vendor documentation for CLI version check

Verify Fix Applied:

Verify version has been updated beyond affected builds and test authentication mechanisms

📡 Detection & Monitoring

Log Indicators:

  • Unusual JWT token generation/validation failures
  • Authentication bypass attempts in update manager logs
  • Privilege escalation events

Network Indicators:

  • Unexpected requests to update manager endpoints
  • JWT token manipulation attempts

SIEM Query:

source="starwind" AND (event_type="auth_failure" OR endpoint="/update-manager")

🔗 References

📤 Share & Export