CVE-2024-33620

8.6 HIGH

📋 TL;DR

An absolute path traversal vulnerability in ID Link Manager and FUJITSU Software TIME CREATOR allows unauthenticated remote attackers to read arbitrary files on the server, potentially exposing sensitive information. This affects organizations using these specific Fujitsu software products with vulnerable versions exposed to network access.

💻 Affected Systems

Products:
  • ID Link Manager
  • FUJITSU Software TIME CREATOR
Versions: Specific versions not detailed in references, but all versions before vendor patches are affected
Operating Systems: Windows (implied from Fujitsu enterprise software)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations when services are exposed to network access

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server file system compromise including sensitive configuration files, credentials, and proprietary data exfiltration

🟠

Likely Case

Unauthorized access to configuration files, logs, and potentially sensitive application data stored on the server

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable services

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances particularly vulnerable
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but requires network access to vulnerable services

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity, especially with unauthenticated access

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched versions available per vendor advisory

Vendor Advisory: https://www.fujitsu.com/jp/group/fsas/about/resources/security/2024/0617.html

Restart Required: Yes

Instructions:

1. Download latest patches from Fujitsu support portal 2. Apply patches to affected systems 3. Restart services 4. Verify patch application

🔧 Temporary Workarounds

Network Access Restriction

windows

Restrict network access to vulnerable services using firewall rules

Windows Firewall: New-NetFirewallRule -DisplayName "Block IDLinkManager" -Direction Inbound -Protocol TCP -LocalPort <service_port> -Action Block

Service Disablement

windows

Temporarily disable vulnerable services if not critically required

sc stop "IDLinkManagerService"
sc config "IDLinkManagerService" start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from untrusted networks
  • Deploy web application firewall (WAF) with path traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check if ID Link Manager or TIME CREATOR services are running and accessible on network ports

Check Version:

Check application version in Control Panel > Programs and Features or via vendor-specific version check tools

Verify Fix Applied:

Verify service version matches patched version from vendor advisory and test path traversal attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in application logs
  • Multiple failed path traversal attempts
  • Access to sensitive file paths from unauthorized sources

Network Indicators:

  • HTTP requests containing '../' sequences or absolute paths
  • Unusual outbound data transfers following file access attempts

SIEM Query:

source="*app_logs*" AND ("..\" OR "../" OR "C:\" OR "/etc/") AND response_code=200

🔗 References

📤 Share & Export