CVE-2023-6269

10.0 CRITICAL

📋 TL;DR

An argument injection vulnerability in Atos Unify OpenScape SBC, Branch, and BCF products allows unauthenticated attackers to bypass authentication, gain administrative access to the web interface, and achieve root SSH access. This affects all unpatched versions of these network appliances, potentially compromising entire telecommunications infrastructure.

💻 Affected Systems

Products:
  • Atos Unify OpenScape Session Border Controller (SBC)
  • Atos Unify OpenScape Branch
  • Atos Unify OpenScape BCF
Versions: SBC and Branch: before V10 R3.4.0; BCF: before V10R10.12.00 and V10R11.05.02
Operating Systems: Appliance-specific Linux distribution
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the appliance with root SSH access, allowing attackers to intercept/modify all traffic, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Unauthenticated attackers gain administrative web interface access and root SSH shell, enabling full control of the appliance and potential lateral movement.

🟢

If Mitigated

If isolated in a DMZ with strict network controls, impact limited to the appliance itself, though still severe due to root access.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows complete takeover of internet-facing appliances.
🏢 Internal Only: HIGH - Even internally, unauthenticated attackers on the same network can achieve root access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on Packet Storm and other sources. Exploitation requires only network access to the administrative interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SBC and Branch: V10 R3.4.0 or later; BCF: V10R10.12.00 or V10R11.05.02 or later

Vendor Advisory: https://networks.unify.com/security/advisories/OBSO-2310-01.pdf

Restart Required: Yes

Instructions:

1. Download the appropriate firmware update from Atos Unify support portal. 2. Backup current configuration. 3. Apply firmware update via administrative interface. 4. Reboot appliance. 5. Verify version is patched.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to administrative interface to trusted management networks only

Firewall Rules

all

Block all external access to administrative web interface ports (typically 443/HTTPS)

🧯 If You Can't Patch

  • Immediately isolate affected appliances in a dedicated VLAN with strict firewall rules
  • Implement network-based intrusion detection/prevention rules to block exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check current firmware version via administrative web interface or SSH. If version is below patched versions, system is vulnerable.

Check Version:

Login to appliance and check version in web interface or via CLI command (varies by product)

Verify Fix Applied:

Verify firmware version matches or exceeds patched versions: SBC/Branch >= V10 R3.4.0, BCF >= V10R10.12.00 or >= V10R11.05.02

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to administrative endpoints
  • Unexpected SSH root login attempts
  • Web interface authentication bypass logs

Network Indicators:

  • Unusual HTTP requests to administrative interface with injection patterns
  • SSH connections from unexpected sources to appliance

SIEM Query:

source_ip=* AND (url_path="/admin/*" OR url_path="/api/*") AND http_status=200 AND auth_result="failed" followed by successful auth

🔗 References

📤 Share & Export