CVE-2024-48951

7.5 HIGH

📋 TL;DR

A Server-Side Request Forgery (SSRF) vulnerability in Logpoint SOAR allows attackers to make the server send requests to internal systems, potentially leaking the Logpoint API token. This token leak can lead to authentication bypass, granting unauthorized access to the Logpoint platform. All Logpoint installations before version 7.5.0 are affected.

💻 Affected Systems

Products:
  • Logpoint SOAR
Versions: All versions before 7.5.0
Operating Systems: All supported Logpoint OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the SOAR component specifically. The vulnerability exists in how SOAR handles external requests that can be manipulated to target internal endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative access to Logpoint, allowing them to exfiltrate sensitive security data, manipulate security configurations, disable monitoring, and pivot to other internal systems using Logpoint's privileged access.

🟠

Likely Case

Attackers obtain API tokens and use them to access Logpoint's API, potentially viewing security alerts, modifying automation rules, or accessing connected systems through Logpoint integrations.

🟢

If Mitigated

With proper network segmentation and API token monitoring, impact is limited to the Logpoint system itself without allowing lateral movement to other critical systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SSRF vulnerabilities are commonly exploited and Logpoint's advisory suggests the attack chain is straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.5.0

Vendor Advisory: https://servicedesk.logpoint.com/hc/en-us/articles/21968916591261-Server-Side-Request-Forgery-SSRF-on-SOAR-results-in-authentication-bypass

Restart Required: Yes

Instructions:

1. Backup Logpoint configuration and data. 2. Download Logpoint 7.5.0 from official sources. 3. Follow Logpoint upgrade documentation for your deployment type. 4. Restart Logpoint services after upgrade. 5. Verify API tokens have not been compromised and rotate if necessary.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict Logpoint SOAR component's outbound network access to only necessary external services

iptables -A OUTPUT -p tcp -m multiport --dports 80,443 -j ACCEPT
iptables -A OUTPUT -j DROP

API Token Monitoring

all

Implement monitoring for unusual API token usage patterns

🧯 If You Can't Patch

  • Implement strict network controls to prevent Logpoint SOAR from accessing internal metadata services or sensitive endpoints
  • Regularly rotate API tokens and monitor for unauthorized token usage

🔍 How to Verify

Check if Vulnerable:

Check Logpoint version via web interface or command line. Versions below 7.5.0 are vulnerable.

Check Version:

cat /opt/logpoint/version.txt

Verify Fix Applied:

Confirm version is 7.5.0 or higher and test that SSRF attempts to internal endpoints are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound requests from Logpoint SOAR to internal endpoints
  • Multiple failed authentication attempts followed by successful API token usage
  • API token usage from unexpected IP addresses

Network Indicators:

  • Logpoint SOAR making requests to internal metadata services (169.254.169.254, 192.168.0.1, etc.)
  • Unexpected outbound connections from Logpoint to internal systems

SIEM Query:

source="logpoint" AND (url="*169.254.169.254*" OR url="*metadata*" OR url="*localhost*" OR url="*127.0.0.1*")

🔗 References

📤 Share & Export