CVE-2023-32090

9.8 CRITICAL

📋 TL;DR

Pega Platform versions 6.1 through 7.3.1 contain default operator credentials that could allow attackers to gain unauthorized access. This affects all clients using these versions with default configurations. Attackers could potentially compromise the entire Pega application environment.

💻 Affected Systems

Products:
  • Pega Platform
Versions: 6.1 through 7.3.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using default operator credentials that haven't been changed from installation defaults.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to access, modify, or delete sensitive data, deploy malicious code, and pivot to other systems.

🟠

Likely Case

Unauthorized access to business applications and data, potentially leading to data theft, manipulation, or service disruption.

🟢

If Mitigated

Limited impact if proper access controls, network segmentation, and credential management are implemented.

🌐 Internet-Facing: HIGH - Default credentials on internet-facing systems can be easily discovered and exploited by automated scanning tools.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit these credentials, though external access would be prevented.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of default credentials but no authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.2 and later

Vendor Advisory: https://support.pega.com/support-doc/pega-security-advisory-%E2%80%93-c23-vulnerability-default-operators

Restart Required: Yes

Instructions:

1. Upgrade to Pega Platform 7.3.2 or later. 2. Apply the patch through standard Pega update procedures. 3. Restart all Pega services. 4. Verify default credentials have been changed or disabled.

🔧 Temporary Workarounds

Change Default Credentials

all

Manually change or disable all default operator credentials in the Pega Platform

Use Pega Platform administration tools to modify operator credentials

Network Access Controls

all

Restrict network access to Pega Platform administration interfaces

Configure firewall rules to limit access to trusted IP addresses only

🧯 If You Can't Patch

  • Immediately change all default operator credentials using Pega administration tools
  • Implement strict network segmentation and firewall rules to limit access to Pega administration interfaces

🔍 How to Verify

Check if Vulnerable:

Check Pega Platform version and verify if default operator credentials are still active using Pega administration tools

Check Version:

Check Pega Platform version through administration console or system properties

Verify Fix Applied:

Verify version is 7.3.2 or later and confirm default credentials have been changed or disabled

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful logins with default credentials
  • Unusual access patterns to administration interfaces

Network Indicators:

  • Unexpected connections to Pega administration ports from unauthorized sources

SIEM Query:

source="pega" AND (event_type="authentication" AND (username="operator" OR username="admin" OR username="administrator"))

🔗 References

📤 Share & Export