CVE-2023-6593

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers with physical or application access to an iOS device running Devolutions Remote Desktop Manager to bypass client-side permissions and execute entries in SQL data sources without restrictions. It affects users of Remote Desktop Manager 2023.3.4.0 and earlier on iOS devices.

💻 Affected Systems

Products:
  • Devolutions Remote Desktop Manager
Versions: 2023.3.4.0 and earlier
Operating Systems: iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects iOS version of Remote Desktop Manager when using SQL data sources.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with device access could execute arbitrary SQL commands, potentially accessing sensitive connection data, credentials, or performing unauthorized remote connections to managed systems.

🟠

Likely Case

An attacker with stolen or compromised iOS device could access stored remote desktop connections and credentials without proper authentication.

🟢

If Mitigated

With proper device security controls and application sandboxing, impact is limited to the specific application's data only.

🌐 Internet-Facing: LOW - This is a client-side vulnerability requiring physical or application access to the iOS device.
🏢 Internal Only: MEDIUM - Internal users with device access could exploit this, but requires specific application access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires physical access to the iOS device or ability to run the application, but exploitation is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.3.5.0 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2023-0023/

Restart Required: Yes

Instructions:

1. Open Apple App Store on iOS device. 2. Search for 'Remote Desktop Manager'. 3. Tap 'Update' or reinstall the latest version. 4. Restart the application.

🔧 Temporary Workarounds

Disable SQL Data Sources

ios

Remove or disable SQL data source configurations in the application

Enhanced Device Security

ios

Enable strong device passcodes, biometric authentication, and device encryption

🧯 If You Can't Patch

  • Implement strict device access controls and physical security for iOS devices
  • Use alternative remote desktop management solutions on affected devices

🔍 How to Verify

Check if Vulnerable:

Check app version in Remote Desktop Manager iOS app settings. If version is 2023.3.4.0 or earlier, you are vulnerable.

Check Version:

Open Remote Desktop Manager iOS app → Settings → About → Check version number

Verify Fix Applied:

Verify app version shows 2023.3.5.0 or later in app settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in application logs
  • Multiple failed permission checks followed by successful access

Network Indicators:

  • Unexpected remote connection attempts from iOS devices

SIEM Query:

app:"Remote Desktop Manager" AND (event:"permission_denied" OR event:"sql_execution") AND result:"success"

🔗 References

📤 Share & Export