CVE-2023-45349

7.5 HIGH

📋 TL;DR

This vulnerability exposes sensitive information in Atos Unify OpenScape 4000 systems that could allow attackers to move laterally to backup systems via AShbr. It affects specific versions of OpenScape 4000 Assistant and Manager software. Organizations using these vulnerable versions are at risk of unauthorized access to backup infrastructure.

💻 Affected Systems

Products:
  • Atos Unify OpenScape 4000 Assistant
  • Atos Unify OpenScape 4000 Manager
Versions: Assistant V10 R1 before V10 R1.34.7, Assistant V10 R1.42.0, Assistant V10 R0, Manager V10 R1 before V10 R1.34.7, Manager V10 R1.42.0, Manager V10 R0
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability involves AShbr component for backup system access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to backup systems, potentially compromising backup data integrity, exfiltrating sensitive information, or disrupting disaster recovery capabilities.

🟠

Likely Case

Unauthorized access to backup systems leading to data exposure and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing lateral movement to backup systems.

🌐 Internet-Facing: LOW - This appears to be an internal vulnerability requiring network access to the affected systems.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems could exploit this to access backup infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network access to vulnerable systems and knowledge of the AShbr component.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V10 R1.34.7 or later for affected V10 R1 versions

Vendor Advisory: https://networks.unify.com/security/advisories/OBSO-2306-01.pdf

Restart Required: Yes

Instructions:

1. Download the patch from Unify support portal. 2. Apply the patch to affected OpenScape 4000 systems. 3. Restart the systems as required. 4. Verify the patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate OpenScape 4000 systems from backup infrastructure using firewall rules

Access Control Restrictions

all

Implement strict access controls to limit who can access AShbr components

🧯 If You Can't Patch

  • Implement strict network segmentation between OpenScape systems and backup infrastructure
  • Monitor network traffic to/from OpenScape systems for unusual access patterns

🔍 How to Verify

Check if Vulnerable:

Check system version against affected versions list and review AShbr component configuration

Check Version:

Check system administration interface or contact Unify support for version verification

Verify Fix Applied:

Verify system version is V10 R1.34.7 or later and test backup system access controls

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to AShbr components
  • Failed or successful unauthorized access attempts to backup systems

Network Indicators:

  • Unexpected network traffic between OpenScape systems and backup infrastructure
  • AShbr protocol traffic from unauthorized sources

SIEM Query:

source_ip IN (OpenScape_IPs) AND dest_ip IN (Backup_System_IPs) AND protocol='AShbr'

🔗 References

📤 Share & Export