CVE-2024-28872

8.9 HIGH

📋 TL;DR

A TLS certificate validation flaw in Stork management tool allows attackers to obtain valid certificates from the Stork server and use them to connect to Stork agents. Once connected, attackers can send malicious commands to monitored services (Kea or BIND 9), potentially causing data loss or denial of service. Only customers using Stork management tool versions 0.15.0 through 1.15.0 are affected.

💻 Affected Systems

Products:
  • Stork management tool
Versions: 0.15.0 through 1.15.0
Operating Systems: All platforms running Stork
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Stork management tool users monitoring Kea or BIND 9 services. BIND 9 and Kea themselves are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of monitored DNS/DHCP infrastructure leading to data exfiltration, service disruption, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized command execution on monitored services resulting in service disruption or configuration changes.

🟢

If Mitigated

Limited impact due to network segmentation and proper certificate management controls.

🌐 Internet-Facing: MEDIUM - Risk exists if Stork server is internet-facing, but exploitation requires obtaining valid certificates first.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can exploit this to gain unauthorized access to monitoring infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires obtaining valid TLS certificates from the Stork server first, which may require some level of access or social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.16.0 or later

Vendor Advisory: https://kb.isc.org/docs/cve-2024-28872

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Upgrade Stork to version 1.16.0 or later. 3. Restart Stork services. 4. Verify certificate validation is functioning correctly.

🔧 Temporary Workarounds

Network segmentation

all

Isolate Stork management network from production and user networks

Certificate rotation

linux

Rotate all TLS certificates used by Stork components

# Regenerate Stork certificates
stork-tool cert-renew --all

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can connect to Stork server and agents
  • Monitor for unusual certificate requests or connections to Stork agents from unexpected sources

🔍 How to Verify

Check if Vulnerable:

Check Stork version with: stork-agent --version or stork-server --version. If version is between 0.15.0 and 1.15.0 inclusive, system is vulnerable.

Check Version:

stork-server --version && stork-agent --version

Verify Fix Applied:

Verify version is 1.16.0 or later and test TLS certificate validation by attempting to connect with invalid certificates.

📡 Detection & Monitoring

Log Indicators:

  • Failed certificate validation attempts
  • Unexpected connections to Stork agents
  • Unusual command execution in monitored services

Network Indicators:

  • Unexpected TLS handshakes with Stork agents
  • Traffic from unauthorized sources to Stork agent ports

SIEM Query:

source="stork*" AND (event_type="certificate_error" OR event_type="unauthorized_connection")

🔗 References

📤 Share & Export