CVE-2024-46627

9.1 CRITICAL

📋 TL;DR

CVE-2024-46627 is an incorrect access control vulnerability in BECN DATAGERRY v2.2 that allows attackers to bypass authentication and execute arbitrary commands via crafted web requests. This affects all organizations running vulnerable versions of DATAGERRY, potentially leading to complete system compromise.

💻 Affected Systems

Products:
  • BECN DATAGERRY
Versions: v2.2
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of DATAGERRY v2.2 are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with remote code execution, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthenticated attackers gain administrative access to DATAGERRY, execute arbitrary commands, and compromise the underlying server.

🟢

If Mitigated

Attackers are blocked by network segmentation, web application firewalls, or proper authentication controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on GitHub, making exploitation trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://datagerry.com/

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to DATAGERRY to trusted networks only

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Web Application Firewall

all

Deploy WAF rules to block crafted requests targeting DATAGERRY endpoints

🧯 If You Can't Patch

  • Immediately isolate DATAGERRY from internet access
  • Implement strict network access controls and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check DATAGERRY version via web interface or configuration files. If version is 2.2, system is vulnerable.

Check Version:

Check web interface or configuration files for version information

Verify Fix Applied:

Verify DATAGERRY is no longer accessible from untrusted networks and monitor for exploitation attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication bypass attempts
  • Suspicious POST/GET requests to DATAGERRY endpoints
  • Command execution patterns in web logs

Network Indicators:

  • Unusual traffic to DATAGERRY ports from untrusted sources
  • Command and control traffic from DATAGERRY server

SIEM Query:

source="datagerry_logs" AND (url="*admin*" OR url="*api*" OR url="*cmd*") AND status="200"

🔗 References

📤 Share & Export