CVE-2023-28382

8.1 HIGH

📋 TL;DR

This directory traversal vulnerability in ESS REC Agent Server Edition allows authenticated attackers to access or modify arbitrary files on affected servers. Attackers with valid credentials can exploit path traversal sequences to read sensitive files or write malicious content. All users running affected versions on Linux, Solaris, HP-UX, or AIX systems are vulnerable.

💻 Affected Systems

Products:
  • ESS REC Agent Server Edition
Versions: Linux: V1.0.0 to V1.4.3, Solaris: V1.1.0 to V1.4.0, HP-UX: V1.1.0 to V1.4.0, AIX: V1.2.0 to V1.4.1
Operating Systems: Linux, Solaris, HP-UX, AIX
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Authentication is required but standard agent credentials may be sufficient.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading of sensitive files (passwords, keys, configuration) or planting backdoors via arbitrary file writes, potentially leading to data exfiltration, ransomware deployment, or persistent access.

🟠

Likely Case

Unauthorized access to sensitive configuration files, logs, or application data, potentially enabling credential theft, privilege escalation, or lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, file system permissions, and authentication controls are in place, restricting the attacker's ability to access critical files or move laterally.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Directory traversal vulnerabilities are well-understood and easily weaponized. While no public PoC exists, exploitation is straightforward for attackers with valid credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux: V1.4.4+, Solaris/HP-UX/AIX: V1.4.1+

Vendor Advisory: https://customer.et-x.jp/app/answers/detail/a_id/2260

Restart Required: Yes

Instructions:

1. Download latest version from vendor portal. 2. Stop ESS REC Agent service. 3. Backup configuration files. 4. Install updated version. 5. Restart service. 6. Verify functionality.

🔧 Temporary Workarounds

Restrict File System Access

all

Apply strict file system permissions to limit the agent's access to only necessary directories

chmod 750 /path/to/agent/directories
chown root:agentgroup /path/to/agent/directories

Network Segmentation

linux

Isolate ESS REC Agent servers from sensitive systems and restrict network access

iptables -A INPUT -s trusted_networks -p tcp --dport agent_port -j ACCEPT
iptables -A INPUT -p tcp --dport agent_port -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with the ESS REC Agent
  • Monitor file access patterns and audit logs for suspicious traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check installed version via agent management interface or configuration files. Compare against affected version ranges.

Check Version:

Check agent configuration file or use vendor-specific version command (varies by platform)

Verify Fix Applied:

Confirm version is updated to patched versions: Linux V1.4.4+, others V1.4.1+. Test directory traversal attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Path traversal sequences in request logs
  • Access to files outside expected agent directories

Network Indicators:

  • Multiple failed file access attempts
  • Unusual file transfer patterns from agent server

SIEM Query:

source="ess_rec_agent" AND (path="../" OR path="..\\" OR filename="passwd" OR filename="shadow")

🔗 References

📤 Share & Export