CVE-2023-35033

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users to execute arbitrary commands on Atos Unify OpenScape 4000 systems through command injection. It affects Assistant and Manager components in specific versions, potentially leading to full system compromise. Organizations using these vulnerable versions are at risk.

💻 Affected Systems

Products:
  • Atos Unify OpenScape 4000 Assistant
  • Atos Unify OpenScape 4000 Manager
Versions: Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8, Assistant V10 R0, Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8, Manager V10 R0
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with system privileges, potentially leading to data theft, lateral movement, or complete system takeover.

🟠

Likely Case

Authenticated attackers gaining unauthorized command execution, potentially escalating privileges, accessing sensitive data, or disrupting services.

🟢

If Mitigated

Limited impact if proper authentication controls, network segmentation, and monitoring are in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection vulnerabilities are typically straightforward to exploit once access is obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V10 R1.42.0 or V10 R1.34.8 for affected V10 R1 versions

Vendor Advisory: https://networks.unify.com/security/advisories/OBSO-2305-01.pdf

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Unify support portal. 2. Backup current configuration. 3. Apply the patch following vendor instructions. 4. Restart the affected services. 5. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Restrict network access

all

Limit access to OpenScape systems to only trusted networks and users

Implement strict authentication controls

all

Enforce strong authentication policies and monitor for suspicious authenticated sessions

🧯 If You Can't Patch

  • Implement network segmentation to isolate OpenScape systems from critical infrastructure
  • Deploy application-level firewalls or WAF rules to detect and block command injection patterns

🔍 How to Verify

Check if Vulnerable:

Check the version of OpenScape Assistant and Manager components against affected version ranges

Check Version:

Check version through OpenScape web interface or administrative console (vendor-specific command not provided in advisory)

Verify Fix Applied:

Verify the installed version is V10 R1.42.0 or later, or V10 R1.34.8 or later for V10 R1 versions

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Multiple failed authentication attempts followed by successful login and command execution
  • System logs showing unexpected process creation

Network Indicators:

  • Unusual outbound connections from OpenScape systems
  • Traffic patterns indicating command and control activity

SIEM Query:

source="openscape*" AND (event_type="command_execution" OR process_name="cmd.exe" OR process_name="bash" OR process_name="sh")

🔗 References

📤 Share & Export