CVE-2023-6269
📋 TL;DR
An argument injection vulnerability in Atos Unify OpenScape SBC, Branch, and BCF products allows unauthenticated attackers to bypass authentication, gain administrative access to the web interface, and achieve root SSH access. This affects all unpatched versions of these network appliances, potentially compromising entire telecommunications infrastructure.
💻 Affected Systems
- Atos Unify OpenScape Session Border Controller (SBC)
- Atos Unify OpenScape Branch
- Atos Unify OpenScape BCF
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the appliance with root SSH access, allowing attackers to intercept/modify all traffic, pivot to internal networks, and maintain persistent access.
Likely Case
Unauthenticated attackers gain administrative web interface access and root SSH shell, enabling full control of the appliance and potential lateral movement.
If Mitigated
If isolated in a DMZ with strict network controls, impact limited to the appliance itself, though still severe due to root access.
🎯 Exploit Status
Public exploit code available on Packet Storm and other sources. Exploitation requires only network access to the administrative interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: SBC and Branch: V10 R3.4.0 or later; BCF: V10R10.12.00 or V10R11.05.02 or later
Vendor Advisory: https://networks.unify.com/security/advisories/OBSO-2310-01.pdf
Restart Required: Yes
Instructions:
1. Download the appropriate firmware update from Atos Unify support portal. 2. Backup current configuration. 3. Apply firmware update via administrative interface. 4. Reboot appliance. 5. Verify version is patched.
🔧 Temporary Workarounds
Network Segmentation
allRestrict access to administrative interface to trusted management networks only
Firewall Rules
allBlock all external access to administrative web interface ports (typically 443/HTTPS)
🧯 If You Can't Patch
- Immediately isolate affected appliances in a dedicated VLAN with strict firewall rules
- Implement network-based intrusion detection/prevention rules to block exploit attempts
🔍 How to Verify
Check if Vulnerable:
Check current firmware version via administrative web interface or SSH. If version is below patched versions, system is vulnerable.
Check Version:
Login to appliance and check version in web interface or via CLI command (varies by product)
Verify Fix Applied:
Verify firmware version matches or exceeds patched versions: SBC/Branch >= V10 R3.4.0, BCF >= V10R10.12.00 or >= V10R11.05.02
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access to administrative endpoints
- Unexpected SSH root login attempts
- Web interface authentication bypass logs
Network Indicators:
- Unusual HTTP requests to administrative interface with injection patterns
- SSH connections from unexpected sources to appliance
SIEM Query:
source_ip=* AND (url_path="/admin/*" OR url_path="/api/*") AND http_status=200 AND auth_result="failed" followed by successful auth
🔗 References
- http://packetstormsecurity.com/files/176194/Atos-Unify-OpenScape-Authentication-Bypass-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2023/Dec/16
- https://networks.unify.com/security/advisories/OBSO-2310-01.pdf
- https://r.sec-consult.com/unifyroot
- http://packetstormsecurity.com/files/176194/Atos-Unify-OpenScape-Authentication-Bypass-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2023/Dec/16
- https://networks.unify.com/security/advisories/OBSO-2310-01.pdf
- https://r.sec-consult.com/unifyroot