CVE-2024-22901
📋 TL;DR
Vinchin Backup & Recovery v7.2 uses default MySQL credentials (root/vinchin) that allow attackers to gain database access. This can lead to full system compromise through privilege escalation and remote code execution. All organizations running vulnerable versions without credential changes are affected.
💻 Affected Systems
- Vinchin Backup & Recovery
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover: attackers gain root access, exfiltrate backup data, deploy ransomware, and pivot to other systems in the network.
Likely Case
Database compromise leading to backup data theft, credential harvesting, and potential ransomware deployment on backup systems.
If Mitigated
Limited to database access only if proper network segmentation and credential management are implemented.
🎯 Exploit Status
Exploit requires MySQL port access. Public exploit scripts and detailed attack chains are available in referenced disclosures.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified by vendor
Vendor Advisory: http://vinchin.com (no specific advisory found)
Restart Required: No
Instructions:
1. Change default MySQL root password immediately. 2. Review and update all database credentials. 3. Monitor for vendor updates.
🔧 Temporary Workarounds
Change MySQL Root Password
linuxImmediately change the default MySQL root password from 'vinchin' to a strong, unique password.
mysql -u root -pvinchin -e "ALTER USER 'root'@'localhost' IDENTIFIED BY 'NEW_STRONG_PASSWORD'; FLUSH PRIVILEGES;"
Restrict MySQL Network Access
linuxBlock external access to MySQL port (3306) using firewall rules.
iptables -A INPUT -p tcp --dport 3306 -j DROP
ufw deny 3306
🧯 If You Can't Patch
- Implement strict network segmentation to isolate backup systems from other networks
- Deploy intrusion detection systems to monitor for MySQL brute force attempts and unusual database queries
🔍 How to Verify
Check if Vulnerable:
Attempt to connect to MySQL using default credentials: mysql -u root -pvinchin -h [TARGET_IP]
Check Version:
Check Vinchin web interface or appliance documentation for version information.
Verify Fix Applied:
Test that default credentials no longer work and only authorized credentials provide access.
📡 Detection & Monitoring
Log Indicators:
- Failed MySQL authentication attempts
- Successful root login from unusual IPs
- Unusual database queries or schema modifications
Network Indicators:
- Port 3306 scanning activity
- MySQL protocol traffic from unexpected sources
- Brute force patterns on MySQL port
SIEM Query:
source="mysql.log" (event="Access denied" OR user="root") | stats count by src_ip
🔗 References
- http://vinchin.com
- https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
- https://seclists.org/fulldisclosure/2024/Jan/30
- http://packetstormsecurity.com/files/176794/Vinchin-Backup-And-Recovery-7.2-Default-MySQL-Credentials.html
- http://seclists.org/fulldisclosure/2024/Jan/30
- http://vinchin.com
- https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
- https://seclists.org/fulldisclosure/2024/Jan/30