CVE-2023-51576

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to execute arbitrary code with SYSTEM privileges on Voltronic Power ViewPower systems. The flaw exists in the RMI interface on TCP port 51099 where untrusted data is deserialized without proper validation. All installations with the vulnerable RMI interface exposed are affected.

💻 Affected Systems

Products:
  • Voltronic Power ViewPower
Versions: Specific versions not detailed in advisory, but all versions with vulnerable RMI interface
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The RMI interface listens on TCP port 51099 by default, making default installations vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install malware, exfiltrate data, pivot to other systems, or disrupt power monitoring operations.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data theft, or system disruption given the high CVSS score and unauthenticated nature.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to port 51099.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI-CAN-22012 indicates proof-of-concept exists, and the vulnerability requires no authentication with straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: Not provided in available references

Restart Required: Yes

Instructions:

1. Contact Voltronic Power for the security patch. 2. Apply the patch to all affected ViewPower installations. 3. Restart the ViewPower service or system to activate the fix.

🔧 Temporary Workarounds

Block RMI Port Access

all

Block external and unnecessary internal access to TCP port 51099 using firewall rules.

Windows: netsh advfirewall firewall add rule name="Block ViewPower RMI" dir=in action=block protocol=TCP localport=51099
Linux: iptables -A INPUT -p tcp --dport 51099 -j DROP

Disable RMI Interface

windows

Disable the vulnerable RMI interface if not required for operations.

Consult Voltronic Power documentation for disabling RMI interface

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ViewPower systems from untrusted networks.
  • Deploy intrusion detection/prevention systems to monitor and block exploitation attempts on port 51099.

🔍 How to Verify

Check if Vulnerable:

Check if TCP port 51099 is listening on ViewPower systems using netstat or port scanning tools.

Check Version:

Check ViewPower application version through its interface or consult vendor documentation.

Verify Fix Applied:

Verify the patch is applied by checking version information and confirming port 51099 is no longer vulnerable to deserialization attacks.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation events, especially with SYSTEM privileges
  • Network connections to port 51099 from unexpected sources
  • Java deserialization errors in application logs

Network Indicators:

  • Traffic to TCP port 51099 containing serialized Java objects
  • Exploitation patterns matching known deserialization payloads

SIEM Query:

source_port=51099 OR (event_id=4688 AND process_name="cmd.exe" AND user="SYSTEM")

🔗 References

📤 Share & Export