CVE-2023-26829
📋 TL;DR
This critical authentication bypass vulnerability in Gladinet CentreStack allows remote attackers to reset passwords for any valid user account without knowing the current password, leading to complete account takeover. All organizations running vulnerable versions of CentreStack are affected, particularly those with internet-facing instances.
💻 Affected Systems
- Gladinet CentreStack
📦 What is this software?
Centrestack by Gladinet
⚠️ Risk & Real-World Impact
Worst Case
Full compromise of all user accounts, including administrative accounts, leading to complete system takeover, data exfiltration, ransomware deployment, and lateral movement across the network.
Likely Case
Attackers gain unauthorized access to user accounts, potentially accessing sensitive files, deploying malware, or using compromised accounts for further attacks.
If Mitigated
Limited impact if proper network segmentation, monitoring, and access controls are in place, though account compromise remains possible.
🎯 Exploit Status
The vulnerability is straightforward to exploit with publicly available technical details. Attackers can craft HTTP requests to the password reset endpoint without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 13.5.9808 and later
Vendor Advisory: https://www.gladinet.com/
Restart Required: Yes
Instructions:
1. Download CentreStack version 13.5.9808 or later from the vendor website. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the CentreStack service. 5. Verify the update was successful.
🔧 Temporary Workarounds
Disable Password Reset Functionality
allTemporarily disable the password reset component to prevent exploitation while planning patching.
Consult CentreStack documentation for disabling specific authentication modules
Network Access Control
allRestrict access to the CentreStack web interface to trusted IP addresses only.
Configure firewall rules to allow only specific IP ranges to access CentreStack ports
🧯 If You Can't Patch
- Implement strict network segmentation to isolate CentreStack from critical systems
- Enable detailed logging and monitoring for password reset attempts and alert on suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check the CentreStack version in the web interface admin panel or configuration files. If version is below 13.5.9808, the system is vulnerable.
Check Version:
Check web interface or consult CentreStack documentation for version command
Verify Fix Applied:
After updating, confirm the version shows 13.5.9808 or higher in the admin interface and test that password reset functionality requires proper authentication.
📡 Detection & Monitoring
Log Indicators:
- Unusual password reset requests, especially for multiple accounts or from unexpected IP addresses
- Failed authentication followed by successful password reset
Network Indicators:
- HTTP POST requests to password reset endpoints from unauthorized sources
- Unusual traffic patterns to authentication URLs
SIEM Query:
source="centrestack" AND (url="*/password/reset*" OR event="password_reset")