CVE-2023-45353

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to upload arbitrary files and execute code on the underlying operating system through the Unify OpenScape Common Management Portal web interface. It affects organizations using Atos Unify OpenScape Common Management Portal V10 before specific patch versions. Attackers need valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Atos Unify OpenScape Common Management Portal
Versions: V10 before V10 R4.17.0 and V10 R5.1.0
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface. Also known as OCMP-6591.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, install malware, exfiltrate data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Attackers with legitimate or stolen credentials upload malicious files to execute code, potentially gaining shell access, installing backdoors, or disrupting services.

🟢

If Mitigated

With proper access controls, network segmentation, and monitoring, impact is limited to isolated systems with minimal data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but appears straightforward based on vulnerability description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V10 R4.17.0 or V10 R5.1.0

Vendor Advisory: https://networks.unify.com/security/advisories/OBSO-2306-02.pdf

Restart Required: Yes

Instructions:

1. Download the patch from Atos Unify support portal. 2. Backup current configuration and data. 3. Apply the patch following vendor instructions. 4. Restart the Common Management Portal service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Access to Management Interface

all

Limit network access to the Common Management Portal web interface to only trusted administrative networks.

Implement Strong Authentication Controls

all

Enforce multi-factor authentication, strong password policies, and regular credential rotation for all administrative accounts.

🧯 If You Can't Patch

  • Isolate the affected system in a dedicated network segment with strict firewall rules
  • Implement application-level monitoring for file upload activities and unusual process execution

🔍 How to Verify

Check if Vulnerable:

Check the software version in the Common Management Portal web interface under System Information or Administration settings.

Check Version:

Check via web interface or consult vendor documentation for CLI version check commands.

Verify Fix Applied:

Verify the version shows V10 R4.17.0 or higher, or V10 R5.1.0 or higher after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads via web interface
  • Unexpected process execution from web service context
  • Authentication logs showing suspicious admin access patterns

Network Indicators:

  • Unusual outbound connections from the management server
  • File upload requests to unexpected endpoints

SIEM Query:

source="web_logs" AND (uri CONTAINS "/upload" OR uri CONTAINS "/file") AND status=200 AND user IN [admin_users]

🔗 References

📤 Share & Export