CVE-2024-11948

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows unauthenticated remote attackers to execute arbitrary code on GFI Archiver installations. The flaw exists in the product installer due to an embedded vulnerable version of Telerik Web UI. Affected systems run GFI Archiver with the vulnerable installer component.

💻 Affected Systems

Products:
  • GFI Archiver
Versions: Specific versions not detailed in advisory, but installations using vulnerable Telerik Web UI in installer
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the installer component, so both fresh installations and potentially existing installations with installer remnants may be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining NETWORK SERVICE privileges, enabling lateral movement, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data theft, or system takeover for botnet/cryptomining activities.

🟢

If Mitigated

Limited impact if system is isolated behind strict network controls, though RCE still possible from internal networks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI-CAN-24041 indicates coordinated vulnerability disclosure, suggesting exploit development occurred. No authentication required makes exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GFI Archiver latest version

Vendor Advisory: https://www.gfi.com/support/security-advisories

Restart Required: Yes

Instructions:

1. Check GFI security advisory for specific patched version. 2. Download latest GFI Archiver installer from official portal. 3. Run installer to update existing installation. 4. Restart affected services/systems.

🔧 Temporary Workarounds

Network Isolation

windows

Block external access to GFI Archiver web interface and installer ports

Windows Firewall: New-NetFirewallRule -DisplayName "Block GFI Archiver" -Direction Inbound -LocalPort 80,443,8080 -Protocol TCP -Action Block

Remove Installer Components

windows

Remove or restrict access to installer files if not needed

Remove-Item -Path "C:\Program Files\GFI\Archiver\Installer\*" -Force

🧯 If You Can't Patch

  • Isolate GFI Archiver server in separate VLAN with strict network ACLs
  • Implement web application firewall (WAF) with RCE protection rules

🔍 How to Verify

Check if Vulnerable:

Check GFI Archiver version and compare with vendor's patched version list. Examine installer directory for Telerik Web UI components.

Check Version:

Check GFI Archiver web interface > Help > About, or examine program files version info

Verify Fix Applied:

Verify GFI Archiver version matches patched version from vendor advisory. Confirm installer no longer contains vulnerable Telerik components.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from w3wp.exe or installer processes
  • HTTP requests to installer endpoints with suspicious parameters
  • Failed authentication attempts to installer components

Network Indicators:

  • HTTP traffic to installer endpoints from unexpected sources
  • Outbound connections from GFI server to suspicious IPs post-exploit

SIEM Query:

source="GFI Archiver" AND (event_type="process_creation" AND process_name IN ("cmd.exe", "powershell.exe", "certutil.exe")) OR (http_request CONTAINS "/installer/")

🔗 References

📤 Share & Export