CVE-2023-29474

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in Atos Unify OpenScape 4000 platforms allows unauthenticated attackers to execute arbitrary operating system commands and gain administrative access. It affects OpenScape 4000 Platform and OpenScape 4000 Manager Platform 10 R1 versions before 10 R1.34.4. Organizations using these telecommunications platforms are at immediate risk.

💻 Affected Systems

Products:
  • Atos Unify OpenScape 4000 Platform
  • Atos Unify OpenScape 4000 Manager Platform
Versions: 10 R1 versions before 10 R1.34.4
Operating Systems: Platform-specific OS
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with affected versions are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent backdoors, exfiltrate sensitive data, disrupt telecommunications services, and pivot to other network systems.

🟠

Likely Case

Attackers gain administrative control over the platform, enabling data theft, service disruption, and lateral movement within the network.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the affected platform, though administrative compromise remains severe.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and allows direct command execution, making exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10 R1.34.4 or later

Vendor Advisory: https://networks.unify.com/security/advisories/OBSO-2303-01.pdf

Restart Required: Yes

Instructions:

1. Download patch from official Unify support portal. 2. Backup current configuration. 3. Apply patch following vendor documentation. 4. Restart affected systems. 5. Verify patch installation and system functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to OpenScape 4000 platforms to only trusted administrative networks

Firewall Rules

all

Implement strict firewall rules to block all external access to OpenScape 4000 management interfaces

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and untrusted networks
  • Implement strict network segmentation and monitor all traffic to/from OpenScape platforms

🔍 How to Verify

Check if Vulnerable:

Check system version via platform web interface or CLI. Vulnerable if version is 10 R1 and less than 10 R1.34.4

Check Version:

Check via platform administration interface or consult vendor documentation for version query commands

Verify Fix Applied:

Verify system version shows 10 R1.34.4 or later. Test that unauthenticated command execution is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to inventory endpoints
  • Unusual command execution patterns in system logs
  • Administrative privilege escalation events

Network Indicators:

  • Unusual traffic to OpenScape inventory endpoints from untrusted sources
  • Command injection patterns in HTTP requests

SIEM Query:

source="openscape*" AND (event="inventory_access" OR event="command_execution") AND user="unauthenticated"

🔗 References

📤 Share & Export