CVE-2023-29974

9.8 CRITICAL

📋 TL;DR

CVE-2023-29974 is a critical authentication vulnerability in pfSense CE 2.6.0 that allows attackers to compromise user accounts due to weak password requirements. This affects all organizations running the vulnerable pfSense version, potentially exposing administrative and user accounts to unauthorized access.

💻 Affected Systems

Products:
  • pfSense CE
Versions: Version 2.6.0
Operating Systems: FreeBSD-based
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects pfSense CE (Community Edition), not pfSense Plus. The vulnerability exists in the default password policy implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative access, modify firewall rules, intercept network traffic, and pivot to internal networks.

🟠

Likely Case

Unauthorized access to user accounts leading to credential theft, privilege escalation, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with strong network segmentation, multi-factor authentication, and proper monitoring in place.

🌐 Internet-Facing: HIGH - pfSense firewalls are typically internet-facing, making them prime targets for authentication attacks.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the pfSense management interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the web interface but leverages weak password policies rather than technical exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: pfSense CE 2.7.0 and later

Vendor Advisory: https://docs.netgate.com/pfsense/en/latest/releases/2-7-0.html

Restart Required: No

Instructions:

1. Backup current configuration. 2. Update to pfSense CE 2.7.0 or later via System > Update. 3. Verify update completed successfully. 4. Review and strengthen password policies.

🔧 Temporary Workarounds

Enforce Strong Password Policy

all

Manually enforce strong password requirements through administrative controls

Navigate to System > User Manager > Settings > Password Policy and configure minimum length 12+ characters, complexity requirements, and expiration

Enable Multi-Factor Authentication

all

Add MFA to all administrative and user accounts

Navigate to System > User Manager > Edit User > Authentication and enable TOTP or other MFA methods

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to pfSense management interface
  • Enable comprehensive logging and monitoring for authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check pfSense version via Dashboard or System > System Information. If version is exactly 2.6.0, system is vulnerable.

Check Version:

ssh admin@pfSense-host 'cat /etc/version' or check web interface Dashboard

Verify Fix Applied:

Verify version is 2.7.0 or later and check that password policy enforces strong requirements.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login
  • Authentication from unusual IP addresses
  • Password policy changes

Network Indicators:

  • Brute force attempts on port 443 (web interface)
  • Unusual authentication traffic patterns

SIEM Query:

source="pfSense" (event_type="authentication" AND result="success") | stats count by src_ip, user | where count > threshold

🔗 References

📤 Share & Export