CVE-2024-33615

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to upload specially crafted Zip files containing path traversal characters to CyberPower PowerPanel servers, enabling them to write files outside intended directories and potentially achieve remote code execution. Organizations using CyberPower PowerPanel Business for Windows are affected.

💻 Affected Systems

Products:
  • CyberPower PowerPanel Business for Windows
Versions: Versions prior to 4.9.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability is in the Zip file import functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through remote code execution, allowing attackers to install malware, steal data, or disrupt power management operations.

🟠

Likely Case

Unauthorized file writes to sensitive system locations, potentially leading to privilege escalation or service disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and file upload restrictions, though the vulnerability remains present.

🌐 Internet-Facing: HIGH - Directly exposed PowerPanel servers can be attacked remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Attack involves uploading a specially crafted Zip file.

No public exploit code is known, but the vulnerability description provides enough detail for skilled attackers to develop exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.9.5

Vendor Advisory: https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads

Restart Required: Yes

Instructions:

1. Download PowerPanel Business for Windows version 4.9.5 or later from CyberPower website. 2. Run the installer to upgrade existing installation. 3. Restart the PowerPanel service or reboot the server.

🔧 Temporary Workarounds

Restrict Zip File Uploads

all

Block or filter Zip file uploads to PowerPanel server if not required for operations.

Network Segmentation

all

Isolate PowerPanel servers from internet and restrict access to trusted networks only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the PowerPanel server
  • Monitor for unusual file upload activities and Zip file processing in server logs

🔍 How to Verify

Check if Vulnerable:

Check PowerPanel version in application interface or installation directory. Versions below 4.9.5 are vulnerable.

Check Version:

Check Help > About in PowerPanel GUI or examine version.txt in installation directory

Verify Fix Applied:

Confirm PowerPanel version is 4.9.5 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Zip file uploads to PowerPanel
  • File write operations outside expected directories
  • Failed authentication attempts followed by file uploads

Network Indicators:

  • HTTP POST requests with Zip file uploads to PowerPanel endpoints
  • Unusual outbound connections from PowerPanel server

SIEM Query:

source="powerpanel.log" AND ("zip" OR "upload") AND ("..\" OR "../")

🔗 References

📤 Share & Export