CVE-2023-48388

9.8 CRITICAL

📋 TL;DR

Multisuns EasyLog web+ uses hard-coded credentials that allow remote attackers to gain unauthorized access. This vulnerability enables attackers to perform arbitrary system operations or disrupt service. All systems running vulnerable versions of EasyLog web+ are affected.

💻 Affected Systems

Products:
  • Multisuns EasyLog web+
Versions: All versions prior to patched version
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations are vulnerable due to hard-coded credentials in the software

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing data theft, ransomware deployment, or permanent service disruption

🟠

Likely Case

Unauthorized access leading to data exfiltration, configuration changes, or service interruption

🟢

If Mitigated

Limited impact if network segmentation and access controls prevent external access

🌐 Internet-Facing: HIGH - Remote attackers can exploit this without authentication
🏢 Internal Only: HIGH - Internal attackers or malware can exploit this easily

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of hard-coded credentials, which may be publicly available

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-7603-b1061-1.html

Restart Required: Yes

Instructions:

1. Contact Multisuns for patched version 2. Apply patch following vendor instructions 3. Restart affected services 4. Change all credentials

🔧 Temporary Workarounds

Network Isolation

linux

Restrict network access to EasyLog web+ systems

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_NETWORK" port protocol="tcp" port="PORT" accept'
firewall-cmd --reload

Credential Rotation

all

Change all system credentials if possible

# Check documentation for credential change procedures

🧯 If You Can't Patch

  • Isolate affected systems from internet and untrusted networks
  • Implement strict network access controls and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if system is running EasyLog web+ and review vendor advisory for version information

Check Version:

# Check EasyLog web+ version through admin interface or configuration files

Verify Fix Applied:

Verify patch installation and test that hard-coded credentials no longer work

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts with hard-coded credentials
  • Unauthorized access from unexpected IPs
  • Configuration changes by unknown users

Network Indicators:

  • Authentication attempts to EasyLog web+ from external sources
  • Unusual traffic patterns to/from affected systems

SIEM Query:

source="easylog" AND (event_type="authentication" AND result="success" AND user="HARDCODED_USER")

🔗 References

📤 Share & Export