CVE-2024-32656

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Ant Media Server versions 2.6.0 through 2.8.2. Any unprivileged operating system user can connect to the JMX service on localhost port 5599/TCP and use the MLet Bean to load malicious MBeans from attacker-controlled servers, executing arbitrary code as the antmedia service account. This can lead to full root compromise on affected systems.

💻 Affected Systems

Products:
  • Ant Media Server
Versions: 2.6.0 through 2.8.2
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires JMX enabled with authentication disabled on localhost port 5599/TCP, which is the default configuration in affected versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full root compromise of the server, allowing complete system takeover, data theft, installation of persistent backdoors, and lateral movement to other systems.

🟠

Likely Case

Local attackers gain antmedia service account privileges, potentially escalating to root through other vulnerabilities or misconfigurations, leading to service disruption and data compromise.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the antmedia service account on isolated systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local system access but no authentication to JMX service. Similar to CVE-2023-26269 in Apache James, making weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.0

Vendor Advisory: https://github.com/ant-media/Ant-Media-Server/security/advisories/GHSA-qwhw-hh9j-54f5

Restart Required: Yes

Instructions:

1. Backup configuration and data. 2. Download and install Ant Media Server version 2.9.0 or later from official sources. 3. Restart the antmedia service. 4. Verify the service is running correctly.

🔧 Temporary Workarounds

Disable JMX authentication parameters

linux

Remove JMX authentication disabling parameters from antmedia.service file to enable authentication.

sudo sed -i '/-Dcom.sun.management.jmxremote.authenticate=false/d' /etc/systemd/system/antmedia.service
sudo systemctl daemon-reload
sudo systemctl restart antmedia

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to the server
  • Configure firewall rules to block port 5599/TCP from all but necessary sources

🔍 How to Verify

Check if Vulnerable:

Check if Ant Media Server version is between 2.6.0 and 2.8.2 and JMX is listening on localhost port 5599 with netstat -tlnp | grep 5599

Check Version:

antmedia -v

Verify Fix Applied:

Verify version is 2.9.0 or later with antmedia -v and confirm JMX authentication is enabled or port 5599 is not listening

📡 Detection & Monitoring

Log Indicators:

  • Unusual JMX connection attempts in Java logs
  • MBean loading from unusual sources in JMX logs

Network Indicators:

  • Unexpected connections to localhost port 5599/TCP
  • Outbound connections from antmedia process to unknown servers

SIEM Query:

source="antmedia.logs" AND "JMX" AND ("MLet" OR "MBean")

🔗 References

📤 Share & Export