CVE-2023-45351

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands on Atos Unify OpenScape 4000 systems via command injection in the AShbr component. Affected systems include OpenScape 4000 Assistant and Manager versions V10 R0 and V10 R1 before specific patches. Attackers with valid credentials can gain remote code execution.

💻 Affected Systems

Products:
  • Atos Unify OpenScape 4000 Assistant
  • Atos Unify OpenScape 4000 Manager
Versions: Assistant V10 R1 before V10 R1.42.1, Assistant V10 R0, Manager V10 R1 before V10 R1.42.1, Manager V10 R0
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the AShbr component. Also known as OSFOURK-24039.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data exfiltration, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution allowing privilege escalation, configuration changes, or service disruption.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and minimal user privileges.

🌐 Internet-Facing: HIGH if systems are exposed to the internet, as authenticated attackers can execute arbitrary commands remotely.
🏢 Internal Only: HIGH due to authenticated command injection allowing internal attackers or compromised accounts to execute arbitrary commands.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but command injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V10 R1.42.1 for affected V10 R1 systems

Vendor Advisory: https://networks.unify.com/security/advisories/OBSO-2306-01.pdf

Restart Required: Yes

Instructions:

1. Download patch from Atos Unify support portal. 2. Apply patch following vendor documentation. 3. Restart affected services. 4. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to OpenScape systems to only trusted administrative networks.

Credential Hardening

all

Implement strong password policies, multi-factor authentication, and regular credential rotation for administrative accounts.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted IP addresses only.
  • Monitor and audit all administrative access to OpenScape systems for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check system version against affected versions listed in advisory. Review authentication logs for unauthorized access attempts.

Check Version:

Check system administration interface or vendor documentation for version information.

Verify Fix Applied:

Verify system version is V10 R1.42.1 or later. Test AShbr functionality to ensure command injection is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful login
  • AShbr component access from unexpected sources

Network Indicators:

  • Unusual outbound connections from OpenScape systems
  • Traffic patterns indicating command and control activity

SIEM Query:

source="openscape*" AND (event="command_execution" OR event="authentication") | stats count by src_ip, user

🔗 References

📤 Share & Export