CVE-2024-11947

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to execute arbitrary code with SYSTEM privileges on GFI Archiver installations. The flaw exists in the Core Service's deserialization process, enabling attackers to run malicious code by sending specially crafted data to TCP port 8017. Organizations using vulnerable versions of GFI Archiver are affected.

💻 Affected Systems

Products:
  • GFI Archiver
Versions: Specific versions not detailed in advisory, but all versions with vulnerable Core Service component
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Core Service listens on TCP port 8017 by default. Authentication is required but could be bypassed if credentials are compromised.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install malware, steal data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Attacker gains SYSTEM-level access to the GFI Archiver server, enabling data exfiltration, installation of backdoors, and lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring that detects exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but uses standard deserialization attack patterns. ZDI-CAN-24029 tracking suggests active research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GFI Archiver security updates

Vendor Advisory: https://www.gfi.com/support/security-advisories

Restart Required: Yes

Instructions:

1. Check GFI security advisory for specific patch version. 2. Download and install the security update from GFI. 3. Restart GFI Archiver services. 4. Verify the Core Service is no longer vulnerable.

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict access to TCP port 8017 to only trusted administrative networks

Windows Firewall: New-NetFirewallRule -DisplayName "Block GFI Archiver 8017" -Direction Inbound -LocalPort 8017 -Protocol TCP -Action Block

Authentication Hardening

all

Implement strong authentication controls and monitor for credential compromise

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to port 8017
  • Monitor for unusual authentication attempts and deserialization-related errors in logs

🔍 How to Verify

Check if Vulnerable:

Check if GFI Archiver Core Service is running and listening on port 8017. Review GFI Archiver version against security advisory.

Check Version:

Check GFI Archiver administration console or installation directory for version information

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version in GFI's security advisory. Test that deserialization attacks no longer succeed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to GFI Archiver
  • Errors in GFI Archiver logs related to deserialization
  • Unexpected process creation with SYSTEM privileges

Network Indicators:

  • Unusual traffic to TCP port 8017 from non-administrative sources
  • Malformed serialized data sent to port 8017

SIEM Query:

source="GFI Archiver" AND (event_type="authentication" AND result="failure") OR (message="*deserialization*" OR message="*serialization*")

🔗 References

📤 Share & Export