CVE-2024-46310

9.1 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to read and modify arbitrary user data in Cfx.re FXServer versions v9601 and earlier. Attackers can exploit an exposed API endpoint to access sensitive information without authentication. All systems running vulnerable versions of FXServer are affected.

💻 Affected Systems

Products:
  • Cfx.re FXServer
Versions: v9601 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user data including credentials, personal information, and administrative access leading to full system takeover.

🟠

Likely Case

Unauthorized access to sensitive user data, potential data theft, and manipulation of user accounts.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub demonstrates exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v9602 or later

Vendor Advisory: http://cfxre.com

Restart Required: Yes

Instructions:

1. Download latest FXServer version from official source. 2. Stop the FXServer service. 3. Replace existing installation with patched version. 4. Restart the FXServer service.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict access to the vulnerable API endpoint using firewall rules.

iptables -A INPUT -p tcp --dport [FXSERVER_PORT] -s [TRUSTED_IPS] -j ACCEPT
iptables -A INPUT -p tcp --dport [FXSERVER_PORT] -j DROP

Reverse Proxy Authentication

all

Implement authentication layer via reverse proxy before the vulnerable endpoint.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FXServer from untrusted networks
  • Deploy web application firewall (WAF) with rules to block unauthorized API access

🔍 How to Verify

Check if Vulnerable:

Check FXServer version via server console or configuration files. If version is v9601 or earlier, system is vulnerable.

Check Version:

Check server startup logs or run 'cat server.cfg' for version information

Verify Fix Applied:

Verify version is v9602 or later and test API endpoint access requires authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API requests to user data endpoints
  • Unusual data access patterns from external IPs

Network Indicators:

  • HTTP requests to /api/user/* endpoints without authentication headers
  • Unusual traffic spikes to API endpoints

SIEM Query:

source="fxserver.log" AND ("GET /api/user" OR "POST /api/user") AND NOT auth_token=*

🔗 References

📤 Share & Export