CVE-2023-39379

7.5 HIGH

📋 TL;DR

Fujitsu Software Infrastructure Manager (ISM) versions V2.8.0.060 store proxy server passwords in cleartext within maintenance data files (ismsnap). This allows attackers with access to these files to retrieve sensitive credentials. Affected products include Advanced Edition, Advanced Edition for PRIMEFLEX, and Essential Edition.

💻 Affected Systems

Products:
  • Fujitsu Software Infrastructure Manager Advanced Edition
  • Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX
  • Fujitsu Software Infrastructure Manager Essential Edition
Versions: V2.8.0.060
Operating Systems: Not specified - likely Windows/Linux where ISM runs
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions store proxy passwords in cleartext by default in ismsnap maintenance data files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain proxy server credentials, potentially gaining access to internal networks, performing man-in-the-middle attacks, or using the proxy for malicious activities.

🟠

Likely Case

Local attackers or malicious insiders with file system access retrieve proxy passwords, compromising network security and potentially exposing other systems.

🟢

If Mitigated

With proper access controls, only authorized administrators can access the maintenance data, limiting exposure to trusted personnel.

🌐 Internet-Facing: LOW - This vulnerability requires local file system access, making direct internet exploitation unlikely unless combined with other vulnerabilities.
🏢 Internal Only: HIGH - Internal attackers, compromised accounts, or malware with file access can easily retrieve sensitive credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires only file read access to the maintenance data location.

Exploitation is straightforward for anyone with access to the ismsnap files; no special tools or techniques needed beyond file reading.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for updated versions

Vendor Advisory: https://support.ts.fujitsu.com/IndexProdSecurity.asp?lng=en

Restart Required: Yes

Instructions:

1. Check Fujitsu security advisory for patched version. 2. Backup ISM configuration. 3. Apply vendor-provided patch or upgrade to fixed version. 4. Restart ISM services. 5. Verify proxy configuration still works.

🔧 Temporary Workarounds

Restrict File Access

all

Set strict file permissions on ismsnap maintenance data directory to prevent unauthorized read access.

chmod 700 /path/to/ismsnap (Linux)
icacls "C:\path\to\ismsnap" /inheritance:r /grant:r "Administrators:F" (Windows)

Remove Proxy Configuration

all

Temporarily disable or remove proxy server configuration from ISM if not essential.

Edit ISM configuration to remove proxy settings

🧯 If You Can't Patch

  • Implement strict access controls on ISM server to limit who can access maintenance data files.
  • Monitor file access to ismsnap directory for unauthorized attempts and implement network segmentation to isolate ISM server.

🔍 How to Verify

Check if Vulnerable:

Check if ISM version is V2.8.0.060 and examine ismsnap files for cleartext proxy passwords using grep or search tools.

Check Version:

Check ISM administration interface or configuration files for version information.

Verify Fix Applied:

After patching, verify no cleartext passwords exist in ismsnap files and check ISM version is updated.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file access attempts to ismsnap directory
  • Failed authentication attempts to proxy server from unexpected sources

Network Indicators:

  • Unusual proxy server connections from ISM server IP
  • Anomalous outbound traffic patterns

SIEM Query:

source="ISM_server" AND (event="FileAccess" AND file_path="*ismsnap*") OR (event="ProxyAuth" AND result="failure")

🔗 References

📤 Share & Export