CVE-2023-26829

9.8 CRITICAL

📋 TL;DR

This critical authentication bypass vulnerability in Gladinet CentreStack allows remote attackers to reset passwords for any valid user account without knowing the current password, leading to complete account takeover. All organizations running vulnerable versions of CentreStack are affected, particularly those with internet-facing instances.

💻 Affected Systems

Products:
  • Gladinet CentreStack
Versions: All versions before 13.5.9808
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the password reset functionality enabled are vulnerable. The vulnerability is in the core authentication component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of all user accounts, including administrative accounts, leading to complete system takeover, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Attackers gain unauthorized access to user accounts, potentially accessing sensitive files, deploying malware, or using compromised accounts for further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, monitoring, and access controls are in place, though account compromise remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit with publicly available technical details. Attackers can craft HTTP requests to the password reset endpoint without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.5.9808 and later

Vendor Advisory: https://www.gladinet.com/

Restart Required: Yes

Instructions:

1. Download CentreStack version 13.5.9808 or later from the vendor website. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the CentreStack service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable Password Reset Functionality

all

Temporarily disable the password reset component to prevent exploitation while planning patching.

Consult CentreStack documentation for disabling specific authentication modules

Network Access Control

all

Restrict access to the CentreStack web interface to trusted IP addresses only.

Configure firewall rules to allow only specific IP ranges to access CentreStack ports

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate CentreStack from critical systems
  • Enable detailed logging and monitoring for password reset attempts and alert on suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check the CentreStack version in the web interface admin panel or configuration files. If version is below 13.5.9808, the system is vulnerable.

Check Version:

Check web interface or consult CentreStack documentation for version command

Verify Fix Applied:

After updating, confirm the version shows 13.5.9808 or higher in the admin interface and test that password reset functionality requires proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unusual password reset requests, especially for multiple accounts or from unexpected IP addresses
  • Failed authentication followed by successful password reset

Network Indicators:

  • HTTP POST requests to password reset endpoints from unauthorized sources
  • Unusual traffic patterns to authentication URLs

SIEM Query:

source="centrestack" AND (url="*/password/reset*" OR event="password_reset")

🔗 References

📤 Share & Export