CVE-2023-30262

8.8 HIGH

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to execute arbitrary code on MIM software's License Server and MIMpacs services via the RMI Registry service. It affects all organizations running MIM software versions 6.9 through 7.0. The attacker can gain full control of affected systems without requiring authentication.

💻 Affected Systems

Products:
  • MIM License Server
  • MIMpacs services
Versions: v6.9 through v7.0
Operating Systems: All supported OS for MIM software
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with RMI Registry service enabled are vulnerable. The services must be network-accessible for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal sensitive data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data exfiltration, or cryptomining operations.

🟢

If Mitigated

Limited impact if systems are isolated, patched, or have network controls preventing RMI access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote code execution without authentication makes this highly attractive to attackers. RMI vulnerabilities are commonly exploited in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v7.0.10

Vendor Advisory: https://www.mimsoftware.com/cve-2023-30262

Restart Required: Yes

Instructions:

1. Download MIM software version 7.0.10 or later from MIMsoftware.com. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart all MIM services. 5. Verify services are running correctly.

🔧 Temporary Workarounds

Network Segmentation

all

Block RMI Registry port (typically 1099) at network perimeter and restrict access to trusted IPs only

# Example firewall rule (Linux iptables): iptables -A INPUT -p tcp --dport 1099 -j DROP
# Windows Firewall: New-NetFirewallRule -DisplayName "Block RMI" -Direction Inbound -Protocol TCP -LocalPort 1099 -Action Block

Disable RMI Registry

all

Disable the vulnerable RMI Registry service if not required for functionality

# Check MIM configuration files for RMI settings and disable
# Typically in configuration files: set rmi.registry.enabled=false

🧯 If You Can't Patch

  • Isolate affected systems from internet and restrict network access to minimum required connections
  • Implement application-level firewall rules to block RMI traffic and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check MIM software version via admin interface or configuration files. If version is between 6.9 and 7.0 inclusive, system is vulnerable.

Check Version:

# Check version in MIM admin console or configuration files
# Look for version information in: /opt/mim/config/ or C:\Program Files\MIM\config\

Verify Fix Applied:

Verify version is 7.0.10 or later and test RMI Registry service is not accepting unauthorized connections.

📡 Detection & Monitoring

Log Indicators:

  • Unusual RMI connection attempts
  • Unexpected process creation from MIM services
  • Authentication failures or bypass attempts

Network Indicators:

  • RMI traffic to port 1099 from untrusted sources
  • Unusual outbound connections from MIM servers

SIEM Query:

source="mim-server" AND (event="RMI" OR port=1099) AND NOT src_ip IN [trusted_ips]

🔗 References

📤 Share & Export