CVE-2023-30367

7.5 HIGH

📋 TL;DR

mRemoteNG versions up to 1.76.20 and 1.77.3-dev load encrypted configuration files into memory in plain text at startup, even when not actively connecting. Attackers can dump memory to extract stored credentials like passwords and connection details, bypassing file encryption. This affects all users who haven't set a custom password encryption key.

💻 Affected Systems

Products:
  • mRemoteNG
Versions: <= v1.76.20 and <= 1.77.3-dev
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable when no custom password encryption key is set; encryption setting is bypassed via memory dump.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of all stored credentials (passwords, SSH keys, RDP credentials) leading to lateral movement across all managed systems.

🟠

Likely Case

Extraction of sensitive credentials from memory dumps, enabling unauthorized access to remote systems.

🟢

If Mitigated

Limited impact if custom encryption key is used and memory dumping is prevented via OS controls.

🌐 Internet-Facing: LOW (mRemoteNG is typically client-side software, not internet-facing).
🏢 Internal Only: HIGH (Attackers with local access or malware can dump memory to steal credentials).

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access or ability to dump process memory; tools like mimikatz or custom scripts can be used.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.77.4 or later

Vendor Advisory: https://github.com/mRemoteNG/mRemoteNG/issues/2420

Restart Required: Yes

Instructions:

1. Download latest version from mRemoteNG GitHub releases. 2. Install over existing version. 3. Restart mRemoteNG.

🔧 Temporary Workarounds

Set custom encryption key

all

Use a strong custom password encryption key in mRemoteNG settings to protect configuration files.

Open mRemoteNG > Tools > Options > Security > Set 'Encryption Engine' to 'AES' and provide a custom key.

Restrict memory access

windows

Use OS controls to limit who can dump memory from mRemoteNG process.

Windows: Configure process security via Group Policy or local security settings.

🧯 If You Can't Patch

  • Set a strong custom encryption key in mRemoteNG and rotate all stored credentials.
  • Isolate mRemoteNG to trusted systems, monitor for memory dumping activity, and consider alternative remote management tools.

🔍 How to Verify

Check if Vulnerable:

Check mRemoteNG version in Help > About; if <=1.76.20 or <=1.77.3-dev, it's vulnerable.

Check Version:

On Windows: Check 'Help > About' in mRemoteNG GUI or inspect installed programs.

Verify Fix Applied:

Update to v1.77.4+, verify version in Help > About, and ensure custom encryption key is set.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process memory access events, unexpected mRemoteNG crashes or restarts.

Network Indicators:

  • Anomalous connections from mRemoteNG host to new internal systems post-exploit.

SIEM Query:

Example: Process creation where parent is mRemoteNG and command includes memory dumping tools like procdump or mimikatz.

🔗 References

📤 Share & Export