CVE-2023-48166
📋 TL;DR
A directory traversal vulnerability in the SOAP Server of Atos Unify OpenScape Voice V10 allows unauthenticated remote attackers to read arbitrary files on the local filesystem. This could expose sensitive configuration files, credentials, or system files, potentially leading to full system compromise. All systems running OpenScape Voice V10 before version V10R3.26.1 are affected.
💻 Affected Systems
- Atos Unify OpenScape Voice
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise through exposure of credentials, configuration files, or sensitive system files leading to privilege escalation and complete control.
Likely Case
Exfiltration of sensitive configuration files containing credentials, API keys, or system information that could enable further attacks.
If Mitigated
Limited information disclosure if file system permissions restrict access to sensitive files, but still exposes directory structure and accessible files.
🎯 Exploit Status
Directory traversal vulnerabilities are typically easy to exploit with simple path manipulation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V10R3.26.1
Vendor Advisory: https://networks.unify.com/security/advisories/OBSO-2401-01.pdf
Restart Required: Yes
Instructions:
1. Download patch V10R3.26.1 from Unify support portal. 2. Apply patch following vendor instructions. 3. Restart OpenScape Voice services. 4. Verify patch installation.
🔧 Temporary Workarounds
Network Segmentation
linuxRestrict network access to OpenScape Voice SOAP Server to trusted IPs only.
iptables -A INPUT -p tcp --dport [SOAP_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [SOAP_PORT] -j DROP
SOAP Server Disable
linuxDisable SOAP Server if not required for functionality.
systemctl stop [SOAP_SERVICE]
systemctl disable [SOAP_SERVICE]
🧯 If You Can't Patch
- Implement strict network access controls to limit SOAP Server exposure to only necessary systems.
- Monitor file access logs for unusual SOAP requests and implement file integrity monitoring on sensitive system files.
🔍 How to Verify
Check if Vulnerable:
Check OpenScape Voice version via admin interface or command line. If version is V10 and less than V10R3.26.1, system is vulnerable.
Check Version:
Check via OpenScape Voice web admin interface or consult vendor documentation for CLI command.
Verify Fix Applied:
Verify version is V10R3.26.1 or later. Test SOAP Server with directory traversal payloads to confirm they are blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual SOAP requests with path traversal patterns (../, ..\, %2e%2e%2f)
- Multiple failed file access attempts via SOAP interface
- SOAP requests accessing system directories
Network Indicators:
- SOAP requests containing directory traversal sequences
- Unusual file paths in SOAP XML requests
SIEM Query:
source="openscape_logs" AND ("..\" OR "../" OR "%2e%2e" OR "%2f..") AND "SOAP"