CVE-2023-46319

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to bypass access controls on WALLIX Bastion's network access administration web interface, exposing sensitive information. It affects organizations using WALLIX Bastion 9.x before 9.0.9 and 10.x before 10.0.5.

💻 Affected Systems

Products:
  • WALLIX Bastion
Versions: 9.x before 9.0.9, 10.x before 10.0.5
Operating Systems: All supported WALLIX Bastion platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the network access administration web interface specifically. All deployments with these versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to sensitive network administration data, potentially compromising the entire bastion infrastructure and connected systems.

🟠

Likely Case

Unauthenticated attackers access sensitive configuration data, user information, or network access policies, leading to information disclosure and potential credential harvesting.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to information disclosure from the bastion system itself.

🌐 Internet-Facing: HIGH - Directly exposed web interfaces can be exploited without authentication from anywhere on the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems can exploit this, but requires network access to the bastion interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates unauthenticated access is possible, suggesting simple HTTP requests could trigger the bypass.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.9 for 9.x, 10.0.5 for 10.x

Vendor Advisory: https://www.wallix.com/support/alerts/

Restart Required: Yes

Instructions:

1. Download the appropriate patch from WALLIX support portal. 2. Backup current configuration. 3. Apply the patch following WALLIX documentation. 4. Restart the bastion services. 5. Verify the version is updated.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to the bastion administration interface using firewall rules.

iptables -A INPUT -p tcp --dport [admin_port] -s [trusted_ips] -j ACCEPT
iptables -A INPUT -p tcp --dport [admin_port] -j DROP

Reverse Proxy with Authentication

all

Place a reverse proxy with strong authentication in front of the bastion administration interface.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the bastion administration interface from untrusted networks.
  • Enable comprehensive logging and monitoring for unauthorized access attempts to the administration interface.

🔍 How to Verify

Check if Vulnerable:

Check the WALLIX Bastion version via the web interface or CLI. If version is 9.x < 9.0.9 or 10.x < 10.0.5, the system is vulnerable.

Check Version:

wget --no-check-certificate -qO- https://localhost:443/api/version || wallix-admin --version

Verify Fix Applied:

Verify the version is 9.0.9 or higher for 9.x, or 10.0.5 or higher for 10.x. Test unauthenticated access to the network access administration interface should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to administration endpoints
  • Access to sensitive information endpoints without authentication logs
  • Failed authentication followed by successful access

Network Indicators:

  • HTTP requests to administration endpoints without authentication headers
  • Unusual traffic patterns to bastion administration interface

SIEM Query:

source="wallix_bastion" AND (url_path="/admin/network*" OR url_path="/api/network*") AND auth_status="unauthenticated" AND response_code=200

🔗 References

📤 Share & Export