CVE-2023-37755

9.8 CRITICAL

📋 TL;DR

i-doit pro and open versions 25 and below have hardcoded default administrator credentials with no forced password change. Unauthenticated attackers can use these credentials to gain full administrator access, affecting all users running vulnerable versions.

💻 Affected Systems

Products:
  • i-doit pro
  • i-doit open
Versions: 25 and below
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise - attackers gain administrator privileges to execute arbitrary commands, steal sensitive data, install malware, or cause permanent system damage.

🟠

Likely Case

Unauthenticated attackers gain administrative access to modify configurations, access sensitive information, and potentially pivot to other systems.

🟢

If Mitigated

With proper network segmentation and monitoring, impact limited to the i-doit application itself with detection of unauthorized access attempts.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows complete takeover of internet-facing instances.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to any network-accessible attacker or insider threat.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple credential-based attack requiring only knowledge of default credentials. Public proof-of-concept code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 26 or later

Vendor Advisory: https://www.i-doit.com/en/security/

Restart Required: Yes

Instructions:

1. Backup your i-doit installation and database. 2. Download and install i-doit version 26 or later. 3. Follow upgrade instructions from vendor documentation. 4. Restart web services. 5. Change all administrator passwords immediately.

🔧 Temporary Workarounds

Change Default Credentials

all

Immediately change default administrator username and password to strong, unique credentials.

Use i-doit web interface: Login → Administration → User Management → Edit admin user → Change credentials

Network Access Control

linux

Restrict network access to i-doit administration interface using firewall rules.

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Immediately change all default administrator credentials to strong, unique passwords
  • Implement network segmentation to restrict access to i-doit administration interface only from trusted networks

🔍 How to Verify

Check if Vulnerable:

Attempt to login to i-doit using default administrator credentials (check vendor documentation for defaults). If login succeeds, system is vulnerable.

Check Version:

Check i-doit web interface footer or admin panel for version information

Verify Fix Applied:

1. Verify i-doit version is 26 or later. 2. Attempt to login with default credentials - should fail. 3. Verify new strong credentials work.

📡 Detection & Monitoring

Log Indicators:

  • Successful login with default admin username
  • Multiple failed login attempts followed by admin access
  • Unusual admin activity from new IP addresses

Network Indicators:

  • Authentication requests to i-doit from unexpected sources
  • Administrative API calls from unauthenticated sources

SIEM Query:

source="i-doit" AND (event="login_success" AND user="admin") OR (event="admin_operation" AND src_ip NOT IN trusted_ips)

🔗 References

📤 Share & Export