CVE-2024-27453

8.6 HIGH

📋 TL;DR

This vulnerability allows a read-only user on Extreme XOS network switches to escalate privileges to root administrator access by sending a specially crafted HTTP POST request to the Machine-to-Machine Interface's python method. It affects Extreme XOS versions through 22.6.1.4, putting network infrastructure at risk of complete compromise.

💻 Affected Systems

Products:
  • Extreme XOS
Versions: Through 22.6.1.4
Operating Systems: Extreme XOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires MMI interface to be enabled and accessible to read-only users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full root control over network switches, enabling network traffic interception, configuration changes, denial of service, and lateral movement to other systems.

🟠

Likely Case

Malicious insiders or compromised low-privilege accounts escalate to administrative privileges, potentially disrupting network operations or stealing sensitive data.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments, though compromised switches still require remediation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires read-only user credentials but exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.6.1.5 and later

Vendor Advisory: https://extreme-networks.my.site.com/ExtrArticleDetail?an=000118266

Restart Required: Yes

Instructions:

1. Download Extreme XOS version 22.6.1.5 or later from Extreme Networks support portal. 2. Backup current configuration. 3. Apply firmware update following Extreme's upgrade procedures. 4. Reboot switch to complete installation.

🔧 Temporary Workarounds

Disable MMI Interface

all

Disable the Machine-to-Machine Interface to prevent exploitation via HTTP POST requests.

configure terminal
no mmi enable

Restrict MMI Access

all

Limit MMI interface access to trusted administrative networks only.

configure terminal
mmi access-group <ACL-NAME>

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate switches from untrusted networks
  • Enforce principle of least privilege by removing unnecessary read-only user accounts

🔍 How to Verify

Check if Vulnerable:

Check Extreme XOS version with 'show version' command and verify if version is 22.6.1.4 or earlier.

Check Version:

show version

Verify Fix Applied:

After patching, verify version is 22.6.1.5 or later using 'show version' command and test that read-only users cannot execute privileged commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to MMI python endpoints
  • Privilege escalation attempts from read-only users
  • Unexpected configuration changes by low-privilege accounts

Network Indicators:

  • HTTP traffic to switch management interfaces containing python method calls
  • Unusual outbound connections from switches after privilege escalation

SIEM Query:

source="extreme_switch" AND (http_method="POST" AND uri="*python*" AND user_role="read-only")

🔗 References

📤 Share & Export