CVE-2022-41397

9.8 CRITICAL

📋 TL;DR

Sage 300's optional Web Screens and Global Search features use a hard-coded encryption key ('LandlordPassKey') to protect sensitive data in configuration files and databases. This allows attackers who gain access to encrypted data to easily decrypt it, exposing credentials and other secrets. All Sage 300 installations with these optional features enabled are affected.

💻 Affected Systems

Products:
  • Sage 300
Versions: All versions through 2022
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when optional Web Screens or Global Search features are enabled. Standard Sage 300 installations without these features are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Sage 300 environment including database credentials, application secrets, and potential lateral movement to connected systems.

🟠

Likely Case

Exfiltration of sensitive configuration data and database credentials leading to data theft and potential privilege escalation.

🟢

If Mitigated

Limited exposure if features are disabled or systems are properly segmented with strict access controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to encrypted configuration files or database tables, but decryption is trivial once data is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023 or later

Vendor Advisory: https://www.sage.com/en-ca/products/sage-300/

Restart Required: Yes

Instructions:

1. Upgrade Sage 300 to version 2023 or later. 2. Apply all available security patches. 3. Restart Sage 300 services. 4. Regenerate any encryption keys that may have been exposed.

🔧 Temporary Workarounds

Disable vulnerable features

windows

Disable Web Screens and Global Search features if not required for business operations

Navigate to Sage 300 Administration > Feature Management and disable 'Web Screens' and 'Global Search'

Restrict file access

windows

Apply strict file permissions to configuration files containing encrypted data

icacls "C:\Program Files\Sage\Sage 300\*.config" /inheritance:r /grant:r "Administrators:(F)" /grant:r "SYSTEM:(F)"

🧯 If You Can't Patch

  • Disable Web Screens and Global Search features immediately
  • Implement network segmentation to isolate Sage 300 systems and restrict access to configuration files

🔍 How to Verify

Check if Vulnerable:

Check if Web Screens or Global Search features are enabled in Sage 300 Administration > Feature Management

Check Version:

Check Help > About in Sage 300 application or review installation directory version information

Verify Fix Applied:

Verify Sage 300 version is 2023 or later and check that encryption keys have been regenerated

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Sage 300 configuration files
  • Unusual database access patterns from Sage 300 service accounts

Network Indicators:

  • Unexpected outbound connections from Sage 300 servers
  • Traffic patterns indicating data exfiltration

SIEM Query:

source="Sage300" AND (event="FileAccess" OR event="ConfigAccess") AND user!="SYSTEM" AND user!="Administrator"

🔗 References

📤 Share & Export