CVE-2023-48166

7.5 HIGH

📋 TL;DR

A directory traversal vulnerability in the SOAP Server of Atos Unify OpenScape Voice V10 allows unauthenticated remote attackers to read arbitrary files on the local filesystem. This could expose sensitive configuration files, credentials, or system files, potentially leading to full system compromise. All systems running OpenScape Voice V10 before version V10R3.26.1 are affected.

💻 Affected Systems

Products:
  • Atos Unify OpenScape Voice
Versions: V10 before V10R3.26.1
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: SOAP Server component must be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through exposure of credentials, configuration files, or sensitive system files leading to privilege escalation and complete control.

🟠

Likely Case

Exfiltration of sensitive configuration files containing credentials, API keys, or system information that could enable further attacks.

🟢

If Mitigated

Limited information disclosure if file system permissions restrict access to sensitive files, but still exposes directory structure and accessible files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities are typically easy to exploit with simple path manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V10R3.26.1

Vendor Advisory: https://networks.unify.com/security/advisories/OBSO-2401-01.pdf

Restart Required: Yes

Instructions:

1. Download patch V10R3.26.1 from Unify support portal. 2. Apply patch following vendor instructions. 3. Restart OpenScape Voice services. 4. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict network access to OpenScape Voice SOAP Server to trusted IPs only.

iptables -A INPUT -p tcp --dport [SOAP_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [SOAP_PORT] -j DROP

SOAP Server Disable

linux

Disable SOAP Server if not required for functionality.

systemctl stop [SOAP_SERVICE]
systemctl disable [SOAP_SERVICE]

🧯 If You Can't Patch

  • Implement strict network access controls to limit SOAP Server exposure to only necessary systems.
  • Monitor file access logs for unusual SOAP requests and implement file integrity monitoring on sensitive system files.

🔍 How to Verify

Check if Vulnerable:

Check OpenScape Voice version via admin interface or command line. If version is V10 and less than V10R3.26.1, system is vulnerable.

Check Version:

Check via OpenScape Voice web admin interface or consult vendor documentation for CLI command.

Verify Fix Applied:

Verify version is V10R3.26.1 or later. Test SOAP Server with directory traversal payloads to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SOAP requests with path traversal patterns (../, ..\, %2e%2e%2f)
  • Multiple failed file access attempts via SOAP interface
  • SOAP requests accessing system directories

Network Indicators:

  • SOAP requests containing directory traversal sequences
  • Unusual file paths in SOAP XML requests

SIEM Query:

source="openscape_logs" AND ("..\" OR "../" OR "%2e%2e" OR "%2f..") AND "SOAP"

🔗 References

📤 Share & Export