CVE-2022-41399
📋 TL;DR
Sage 300's optional Web Screens feature uses a hard-coded encryption key to protect database credentials, allowing attackers who can access the configuration file to decrypt and gain unauthorized access to the SQL database. This affects all Sage 300 installations with the Web Screens feature enabled through version 2022.
💻 Affected Systems
- Sage 300
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain full database access, leading to data theft, manipulation, or complete system compromise through SQL injection or privilege escalation.
Likely Case
Unauthorized database access resulting in sensitive business data exposure, including financial records, customer information, and proprietary data.
If Mitigated
Limited exposure if database is properly segmented with network controls and minimal privileges, though credentials remain compromised.
🎯 Exploit Status
Exploitation requires file system access to read dbconfig.xml and knowledge of the hard-coded key. No authentication bypass needed if file is accessible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2023 or later
Vendor Advisory: https://www.sage.com/en-ca/products/sage-300/
Restart Required: Yes
Instructions:
1. Upgrade Sage 300 to version 2023 or later. 2. Apply any available security updates from Sage. 3. Restart the Sage 300 service and verify Web Screens functionality.
🔧 Temporary Workarounds
Disable Web Screens Feature
windowsRemove or disable the optional Web Screens feature if not required for business operations.
Consult Sage 300 administration guide for feature disablement procedures
Restrict File Access
windowsApply strict file system permissions to dbconfig.xml to prevent unauthorized read access.
icacls "C:\Path\To\dbconfig.xml" /deny Everyone:(R)
Set file permissions to allow only necessary service accounts
🧯 If You Can't Patch
- Implement network segmentation to isolate the Sage 300 database server from untrusted networks
- Rotate database credentials and monitor for unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check if Web Screens feature is enabled and dbconfig.xml exists with encrypted connection strings. Review file permissions.
Check Version:
Check Sage 300 About dialog or installation directory version files
Verify Fix Applied:
Confirm Sage 300 version is 2023+ and dbconfig.xml no longer uses hard-coded key encryption.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to dbconfig.xml
- Unusual database connection patterns from Sage 300 server
Network Indicators:
- SQL traffic from unexpected sources to Sage 300 database
SIEM Query:
source="windows-security" EventID=4663 ObjectName="*dbconfig.xml*"