CVE-2022-41399

7.5 HIGH

📋 TL;DR

Sage 300's optional Web Screens feature uses a hard-coded encryption key to protect database credentials, allowing attackers who can access the configuration file to decrypt and gain unauthorized access to the SQL database. This affects all Sage 300 installations with the Web Screens feature enabled through version 2022.

💻 Affected Systems

Products:
  • Sage 300
Versions: All versions through 2022
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when optional Web Screens feature is enabled. The dbconfig.xml file must be accessible to attackers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain full database access, leading to data theft, manipulation, or complete system compromise through SQL injection or privilege escalation.

🟠

Likely Case

Unauthorized database access resulting in sensitive business data exposure, including financial records, customer information, and proprietary data.

🟢

If Mitigated

Limited exposure if database is properly segmented with network controls and minimal privileges, though credentials remain compromised.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires file system access to read dbconfig.xml and knowledge of the hard-coded key. No authentication bypass needed if file is accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023 or later

Vendor Advisory: https://www.sage.com/en-ca/products/sage-300/

Restart Required: Yes

Instructions:

1. Upgrade Sage 300 to version 2023 or later. 2. Apply any available security updates from Sage. 3. Restart the Sage 300 service and verify Web Screens functionality.

🔧 Temporary Workarounds

Disable Web Screens Feature

windows

Remove or disable the optional Web Screens feature if not required for business operations.

Consult Sage 300 administration guide for feature disablement procedures

Restrict File Access

windows

Apply strict file system permissions to dbconfig.xml to prevent unauthorized read access.

icacls "C:\Path\To\dbconfig.xml" /deny Everyone:(R)
Set file permissions to allow only necessary service accounts

🧯 If You Can't Patch

  • Implement network segmentation to isolate the Sage 300 database server from untrusted networks
  • Rotate database credentials and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if Web Screens feature is enabled and dbconfig.xml exists with encrypted connection strings. Review file permissions.

Check Version:

Check Sage 300 About dialog or installation directory version files

Verify Fix Applied:

Confirm Sage 300 version is 2023+ and dbconfig.xml no longer uses hard-coded key encryption.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to dbconfig.xml
  • Unusual database connection patterns from Sage 300 server

Network Indicators:

  • SQL traffic from unexpected sources to Sage 300 database

SIEM Query:

source="windows-security" EventID=4663 ObjectName="*dbconfig.xml*"

🔗 References

📤 Share & Export