CVE-2023-33730

9.8 CRITICAL

📋 TL;DR

CVE-2023-33730 is a critical privilege escalation vulnerability in Microworld Technologies eScan Management Console that allows remote attackers to retrieve any user's password in plain text. This affects eScan Management Console version 14.0.1400.2281, potentially exposing administrative credentials to unauthorized parties.

💻 Affected Systems

Products:
  • Microworld Technologies eScan Management Console
Versions: 14.0.1400.2281
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the affected version. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the eScan Management Console with administrative privileges, allowing attackers to disable security controls, deploy malware, and pivot to other systems in the network.

🟠

Likely Case

Attackers gain administrative access to the eScan console, allowing them to disable antivirus protection, exfiltrate sensitive data, and maintain persistence in the environment.

🟢

If Mitigated

Limited impact if console is isolated from internet and strict network segmentation prevents lateral movement after initial compromise.

🌐 Internet-Facing: HIGH - The vulnerability allows remote unauthenticated exploitation, making internet-facing instances extremely vulnerable to attack.
🏢 Internal Only: HIGH - Even internally, any attacker with network access to the console can exploit this vulnerability to gain administrative privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code is available on GitHub, making exploitation trivial for attackers with basic technical skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version (beyond 14.0.1400.2281)

Vendor Advisory: https://www.escanav.com/

Restart Required: Yes

Instructions:

1. Contact Microworld Technologies for the latest patched version. 2. Backup current configuration. 3. Install the updated version. 4. Restart the eScan Management Console service.

🔧 Temporary Workarounds

Network Isolation

windows

Restrict network access to the eScan Management Console to only trusted administrative IP addresses

Windows Firewall: New-NetFirewallRule -DisplayName "Block eScan Console" -Direction Inbound -Protocol TCP -LocalPort 8080 -RemoteAddress Any -Action Block

Disable Remote Access

windows

Configure eScan Management Console to only accept local connections

Modify eScan configuration to bind to 127.0.0.1 instead of 0.0.0.0

🧯 If You Can't Patch

  • Immediately isolate the eScan Management Console from all untrusted networks and internet access
  • Implement strict network segmentation and monitor all access attempts to the console

🔍 How to Verify

Check if Vulnerable:

Check eScan Management Console version in the console interface or via installed programs list

Check Version:

wmic product where name="eScan Management Console" get version

Verify Fix Applied:

Verify version is updated beyond 14.0.1400.2281 and test that the GetUserCurrentPwd function no longer returns plain text passwords

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to eScan console
  • Multiple failed login attempts followed by successful admin login
  • Access to GetUserCurrentPwd function in web logs

Network Indicators:

  • HTTP requests to eScan console endpoints from unexpected IP addresses
  • Traffic patterns indicating password retrieval attempts

SIEM Query:

source="eScan_logs" AND (event="GetUserCurrentPwd" OR event="password_retrieval")

🔗 References

📤 Share & Export