CVE-2023-39073

9.8 CRITICAL

📋 TL;DR

This vulnerability in SNMP Web Pro v1.1 allows remote attackers to execute arbitrary code and access sensitive information through specially crafted requests. It affects all systems running the vulnerable version of SNMP Web Pro software. The high CVSS score indicates critical severity with network-accessible attack vectors.

💻 Affected Systems

Products:
  • SNMP Web Pro
Versions: v1.1
Operating Systems: All platforms running SNMP Web Pro
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.1 appear vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Remote code execution allowing attackers to install malware, create backdoors, or exfiltrate sensitive SNMP configuration data and system information.

🟢

If Mitigated

Limited impact if proper network segmentation, firewalls, and access controls prevent external access to the vulnerable service.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The provided GitHub gist contains exploit details, making weaponization straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Network Access Restriction

all

Block external access to SNMP Web Pro service using firewall rules

iptables -A INPUT -p tcp --dport [SNMP_PORT] -j DROP
netsh advfirewall firewall add rule name="Block SNMP Web Pro" dir=in action=block protocol=TCP localport=[SNMP_PORT]

Service Disablement

all

Temporarily disable SNMP Web Pro service until permanent solution available

systemctl stop snmp-web-pro
sc stop "SNMP Web Pro"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SNMP Web Pro from internet and critical systems
  • Deploy web application firewall (WAF) with rules to block suspicious SNMP requests

🔍 How to Verify

Check if Vulnerable:

Check if SNMP Web Pro version 1.1 is installed and running on any system

Check Version:

Check application interface or installation directory for version information

Verify Fix Applied:

Verify service is stopped or network access is blocked via firewall rules

📡 Detection & Monitoring

Log Indicators:

  • Unusual SNMP request patterns
  • Multiple failed authentication attempts
  • Unexpected process creation from SNMP service

Network Indicators:

  • Suspicious traffic to SNMP Web Pro port
  • Unusual outbound connections from SNMP service

SIEM Query:

source="SNMP Web Pro" AND (event_type="authentication_failure" OR process="cmd.exe" OR process="powershell.exe")

🔗 References

📤 Share & Export