CVE-2023-42032

7.5 HIGH

📋 TL;DR

This vulnerability in Visualware MyConnection Server exposes the doRTAAccessUPass method, allowing unauthenticated remote attackers to access sensitive application information. All installations with exposed vulnerable versions are affected, potentially revealing configuration details, credentials, or other sensitive data.

💻 Affected Systems

Products:
  • Visualware MyConnection Server
Versions: Specific versions not publicly detailed in references; check vendor advisory for exact affected versions
Operating Systems: All platforms running MyConnection Server
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration; authentication not required for exploitation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disclosure of sensitive application data including credentials, configuration secrets, and system information leading to further compromise.

🟠

Likely Case

Information disclosure of application configuration details and potentially sensitive operational data.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable endpoints.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI-CAN-21611 reference suggests detailed technical analysis exists but public exploit code not confirmed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://myconnectionserver.visualware.com/support/security-advisories

Restart Required: Yes

Instructions:

1. Review vendor security advisory 2. Download and apply latest patch from Visualware 3. Restart MyConnection Server service 4. Verify patch application

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to MyConnection Server to trusted IPs only

Use firewall rules to limit access to MyConnection Server port(s)

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to block external access
  • Monitor for unusual access patterns to MyConnection Server endpoints

🔍 How to Verify

Check if Vulnerable:

Check MyConnection Server version against vendor advisory; test if doRTAAccessUPass endpoint responds to unauthenticated requests

Check Version:

Check MyConnection Server web interface or configuration files for version information

Verify Fix Applied:

Verify updated version number and test that doRTAAccessUPass endpoint no longer discloses information without authentication

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to doRTAAccessUPass endpoint
  • Unauthenticated requests to sensitive endpoints

Network Indicators:

  • HTTP requests to doRTAAccessUPass method without authentication
  • Unusual data extraction patterns

SIEM Query:

source="myconnectionserver" AND (uri="*doRTAAccessUPass*" OR method="POST") AND user="-"

🔗 References

📤 Share & Export