CVE-2023-3113
📋 TL;DR
An unauthenticated XML external entity injection (XXE) vulnerability in Lenovo XClarity Administrator's CIM server allows attackers to read specific files without authentication. This affects organizations using Lenovo XClarity Administrator for infrastructure management. The vulnerability enables limited file disclosure but not full system compromise.
💻 Affected Systems
- Lenovo XClarity Administrator (LXCA)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive configuration files, potentially obtaining credentials, system information, or other confidential data that could facilitate further attacks.
Likely Case
Unauthenticated attackers reading specific files containing system information or configuration details, potentially enabling reconnaissance for follow-up attacks.
If Mitigated
Limited impact with proper network segmentation and access controls preventing external access to the CIM server.
🎯 Exploit Status
XXE vulnerabilities typically have low exploitation complexity; unauthenticated nature increases risk.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: LXCA 5.5.2
Vendor Advisory: https://support.lenovo.com/us/en/product_security/LEN-98715
Restart Required: Yes
Instructions:
1. Download LXCA 5.5.2 from Lenovo support portal. 2. Backup current configuration. 3. Apply update through LXCA web interface. 4. Restart appliance as prompted.
🔧 Temporary Workarounds
Disable CIM server
allTemporarily disable the vulnerable CIM server component if not required
Specific commands not provided in advisory; disable via LXCA web interface under CIM server settings
Network segmentation
linuxRestrict network access to LXCA CIM server ports
firewall-cmd --permanent --remove-service=cim-server
systemctl restart firewalld
🧯 If You Can't Patch
- Implement strict network access controls to prevent external access to LXCA CIM server
- Monitor for unusual XML parsing activity or file access attempts on the LXCA appliance
🔍 How to Verify
Check if Vulnerable:
Check LXCA version via web interface or SSH: cat /etc/os-release | grep VERSION
Check Version:
ssh admin@lxca-host 'cat /etc/os-release | grep VERSION'
Verify Fix Applied:
Confirm version is 5.5.2 or later and test XXE payloads no longer work
📡 Detection & Monitoring
Log Indicators:
- Unusual XML parsing errors in CIM server logs
- Multiple failed authentication attempts to CIM server
Network Indicators:
- External IP addresses accessing CIM server port (default 5989)
- XML payloads with external entity references
SIEM Query:
source="lxca-logs" AND ("CIM" OR "5989") AND ("XXE" OR "external entity" OR "DOCTYPE")