CVE-2021-45977

9.8 CRITICAL

📋 TL;DR

This vulnerability in JetBrains IDEs used as Remote Development backends causes them to bind to all network interfaces (0.0.0.0) instead of localhost only, exposing development environments to unauthorized network access. It affects users running specific preview/RC versions of JetBrains IDEs in remote development mode. The CVSS 9.8 score indicates critical severity due to potential unauthorized access to development environments.

💻 Affected Systems

Products:
  • IntelliJ IDEA
  • PyCharm Professional
  • GoLand
  • PhpStorm
  • RubyMine
  • CLion
  • WebStorm
Versions: Specific preview/RC versions: 2021.3.1 Preview, 2021.3.1 RC for various IDEs
Operating Systems: All platforms where these IDEs run
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects when used as Remote Development backend IDEs. Regular local IDE usage is not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers on the same network could gain full access to the development environment, potentially stealing source code, credentials, and executing arbitrary code.

🟠

Likely Case

Unauthorized users accessing exposed IDE services, potentially viewing/modifying projects or accessing integrated tools.

🟢

If Mitigated

Limited exposure if network segmentation/firewalls block external access, but local network users could still potentially access.

🌐 Internet-Facing: HIGH - If exposed to internet without firewall protection, anyone could potentially access the development environment.
🏢 Internal Only: HIGH - Even internally, any user on the network could potentially access exposed IDE services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the exposed service. No authentication needed if service is reachable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IntelliJ IDEA 2021.3.1, PyCharm Professional 2021.3.1, GoLand 2021.3.2, PhpStorm 2021.3.1 (213.6461.83), RubyMine 2021.3.1, CLion 2021.3.2, WebStorm 2021.3.1

Vendor Advisory: https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/

Restart Required: Yes

Instructions:

1. Open affected IDE. 2. Go to Help > Check for Updates. 3. Install available updates. 4. Restart IDE. 5. Verify version matches fixed versions listed above.

🔧 Temporary Workarounds

Network Firewall Restriction

all

Block network access to JetBrains IDE ports using host or network firewall

# Linux: iptables -A INPUT -p tcp --dport [IDE_PORT] -j DROP
# Windows: netsh advfirewall firewall add rule name="Block JetBrains IDE" dir=in action=block protocol=TCP localport=[IDE_PORT]

Bind to Localhost Only

all

Configure IDE to bind only to localhost/127.0.0.1 instead of all interfaces

# Check IDE configuration for network binding settings
# Modify IDE configuration files to set bind address to 127.0.0.1

🧯 If You Can't Patch

  • Disable Remote Development feature entirely
  • Use VPN/network segmentation to isolate development environments from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check IDE version in Help > About. If using Remote Development and version matches affected preview/RC versions listed, you are vulnerable.

Check Version:

# Linux/Mac: Check IDE about dialog or installation directory
# Windows: Check IDE about dialog or Program Files\JetBrains directory

Verify Fix Applied:

Verify IDE version matches fixed versions listed above and test that IDE services are not accessible from network interfaces other than localhost.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected network connections to IDE ports
  • Authentication attempts from unexpected IP addresses

Network Indicators:

  • Network scans targeting JetBrains IDE default ports
  • Unexpected traffic to development environment IPs on IDE ports

SIEM Query:

source_ip NOT IN (trusted_dev_ips) AND dest_port IN (6942, 63342, 69420) OR process_name CONTAINS 'idea' AND network_connection

🔗 References

📤 Share & Export