CVE-2023-35031

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users to execute arbitrary commands on affected Atos Unify OpenScape 4000 systems through command injection. Attackers with valid credentials can potentially gain full system control. Affected products include Assistant V10 R1, Assistant V10 R0, Manager V10 R1, and Manager V10 R0.

💻 Affected Systems

Products:
  • Atos Unify OpenScape 4000 Assistant
  • Atos Unify OpenScape 4000 Manager
Versions: Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8, Assistant V10 R0, Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8, Manager V10 R0
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data theft, lateral movement, ransomware deployment, or complete system takeover.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive data and system configuration manipulation.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection vulnerabilities are typically straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Assistant V10 R1.42.0, Assistant V10 R1.34.8, Manager V10 R1.42.0, Manager V10 R1.34.8

Vendor Advisory: https://networks.unify.com/security/advisories/OBSO-2305-01.pdf

Restart Required: Yes

Instructions:

1. Download patches from Unify support portal. 2. Backup system configuration. 3. Apply patches according to vendor documentation. 4. Restart affected services. 5. Verify patch installation.

🔧 Temporary Workarounds

Restrict User Access

all

Limit authenticated user access to only necessary personnel and implement strict access controls.

Network Segmentation

all

Isolate OpenScape systems from critical network segments and implement firewall rules to restrict access.

🧯 If You Can't Patch

  • Implement strict network access controls and segment affected systems
  • Enforce least privilege access and monitor all authenticated user activity

🔍 How to Verify

Check if Vulnerable:

Check system version via web interface or CLI and compare against vulnerable versions listed in advisory.

Check Version:

Check via system web interface or consult vendor documentation for version query commands.

Verify Fix Applied:

Verify installed version is V10 R1.42.0 or V10 R1.34.8 or later for affected products.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Multiple failed authentication attempts followed by successful login
  • Suspicious process creation from web services

Network Indicators:

  • Unusual outbound connections from OpenScape systems
  • Traffic to unexpected ports or IP addresses

SIEM Query:

source="openscape*" AND (event_type="command_execution" OR process_name="cmd.exe" OR process_name="/bin/sh")

🔗 References

📤 Share & Export