CVE-2023-22855

9.8 CRITICAL

📋 TL;DR

CVE-2023-22855 is a critical remote code execution vulnerability in Kardex Mlog MCC warehouse management software. It allows attackers to upload malicious .t4 template files that get executed by the .NET templating engine, leading to complete system compromise. Organizations using affected versions of Kardex Mlog MCC with the web interface exposed are at risk.

💻 Affected Systems

Products:
  • Kardex Mlog MCC
Versions: 5.7.12+0-a203c2a213-master and likely earlier versions
Operating Systems: Windows (since it uses .NET)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web interface component that listens on port 8088 by default. Systems with this port accessible are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code, steal sensitive data, install malware, pivot to other systems, and disrupt warehouse operations.

🟠

Likely Case

Remote code execution leading to data theft, ransomware deployment, or system takeover for cryptocurrency mining or botnet participation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - The web interface listens on port 8088 and the exploit requires no authentication, making internet-exposed systems extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, the vulnerability can be exploited by any user with network access to the system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts are available, including on Exploit-DB and GitHub. The attack requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not publicly available

Restart Required: No

Instructions:

Contact Kardex directly for patching guidance. No official patch information is publicly documented in the provided references.

🔧 Temporary Workarounds

Block Port 8088

all

Block access to the vulnerable web interface port using firewall rules

Windows: netsh advfirewall firewall add rule name="Block Mlog MCC" dir=in action=block protocol=TCP localport=8088
Linux: iptables -A INPUT -p tcp --dport 8088 -j DROP

Disable Web Interface

windows

Disable or stop the web service component if not required

Check service configuration in Mlog MCC administration panel or Windows Services

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Mlog MCC systems from untrusted networks
  • Deploy web application firewall (WAF) rules to block file inclusion patterns and .t4 file uploads

🔍 How to Verify

Check if Vulnerable:

Check if port 8088 is listening and accessible. Test by attempting to access http://[target]:8088/ and checking for Mlog MCC interface.

Check Version:

Check the software version through the Mlog MCC administration interface or installed program details in Windows.

Verify Fix Applied:

Verify port 8088 is no longer accessible or that firewall rules are blocking the port. Test with nmap or telnet to confirm.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to port 8088
  • .t4 file processing in application logs
  • Unexpected process execution from web service

Network Indicators:

  • HTTP requests to port 8088 with file upload patterns
  • SMB connections initiated by the Mlog MCC service
  • Outbound connections from Mlog MCC to unknown IPs

SIEM Query:

source_port:8088 AND (http_method:POST OR file_extension:".t4") OR process_name:"t4" OR cmdline:"mono/t4"

🔗 References

📤 Share & Export