CVE-2024-35304

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary system commands on Pandora FMS servers through improper input validation in the Netflow function. It affects Pandora FMS versions from 700 through 776, enabling potential full system compromise.

💻 Affected Systems

Products:
  • Pandora FMS
Versions: From 700 through 776
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with Netflow function enabled; default configurations are vulnerable if the software is within the affected version range.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full remote code execution, leading to data theft, system takeover, or deployment of ransomware across the network.

🟠

Likely Case

Unauthenticated attackers exploit the flaw to execute commands, potentially compromising the server and pivoting to internal systems.

🟢

If Mitigated

With strict network segmentation and input validation, impact is limited to isolated server compromise without lateral movement.

🌐 Internet-Facing: HIGH, as the vulnerability can be exploited remotely without authentication, making exposed servers immediate targets.
🏢 Internal Only: MEDIUM, as internal attackers or malware could exploit it, but requires network access to the Pandora FMS instance.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward due to command injection via improper input validation, but no public proof-of-concept has been confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 777

Vendor Advisory: https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/

Restart Required: Yes

Instructions:

1. Backup your Pandora FMS configuration and data. 2. Upgrade to version 777 or later from the official Pandora FMS repository. 3. Restart the Pandora FMS services to apply the patch.

🔧 Temporary Workarounds

Disable Netflow Function

all

Temporarily disable the Netflow feature to block the attack vector until patching is possible.

Edit Pandora FMS configuration to set netflow_enabled = 0 and restart services.

Network Segmentation

linux

Restrict access to Pandora FMS servers to trusted IPs only using firewall rules.

iptables -A INPUT -p tcp --dport <Pandora_port> -s <trusted_IP> -j ACCEPT
iptables -A INPUT -p tcp --dport <Pandora_port> -j DROP

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for Netflow data inputs to block command injection attempts.
  • Monitor and audit system logs for unusual command execution patterns and isolate the server from critical networks.

🔍 How to Verify

Check if Vulnerable:

Check the Pandora FMS version; if it is between 700 and 776, the system is vulnerable.

Check Version:

cat /usr/share/pandora_server/VERSION or check via Pandora FMS web interface under 'About'.

Verify Fix Applied:

After upgrading, confirm the version is 777 or higher and test Netflow functionality for any command injection attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual system command executions in Pandora FMS logs, especially related to Netflow processing.
  • Error logs showing malformed input in Netflow requests.

Network Indicators:

  • Suspicious inbound traffic to Pandora FMS Netflow ports with command-like payloads.
  • Outbound connections from Pandora FMS server to unknown external IPs.

SIEM Query:

source="pandora_logs" AND (command_injection OR netflow AND abnormal_input)

🔗 References

📤 Share & Export