CVE-2024-53458

7.5 HIGH

📋 TL;DR

Sysax Multi Server 6.99 is vulnerable to denial of service when processing malicious SSH packets, causing service disruption. This affects organizations using this specific version of the file transfer and automation server software.

💻 Affected Systems

Products:
  • Sysax Multi Server
Versions: 6.99
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects version 6.99 specifically. Requires SSH service to be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of Sysax Multi Server, disrupting file transfers, scheduled tasks, and SSH-based automation workflows.

🟠

Likely Case

Temporary service disruption requiring manual restart of the Sysax Multi Server service.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and response.

🌐 Internet-Facing: HIGH - SSH services exposed to the internet are directly vulnerable to DoS attacks from any external source.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could disrupt business-critical file transfer operations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit code is publicly available on Packet Storm. Attack requires network access to SSH port (default 22).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.00 or later

Vendor Advisory: https://www.sysax.com/

Restart Required: Yes

Instructions:

1. Download latest version from Sysax website. 2. Backup configuration. 3. Install update. 4. Restart Sysax Multi Server service.

🔧 Temporary Workarounds

Restrict SSH Access

windows

Limit SSH connections to trusted IP addresses only using firewall rules.

netsh advfirewall firewall add rule name="Restrict Sysax SSH" dir=in action=allow protocol=TCP localport=22 remoteip=192.168.1.0/24,10.0.0.0/8

🧯 If You Can't Patch

  • Implement network segmentation to isolate Sysax server from untrusted networks
  • Deploy intrusion prevention system (IPS) with SSH DoS protection rules

🔍 How to Verify

Check if Vulnerable:

Check Sysax Multi Server version in Help > About menu or registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Sysax\Multi Server\Version

Check Version:

reg query "HKLM\SOFTWARE\Sysax\Multi Server" /v Version

Verify Fix Applied:

Verify version is 7.00 or higher and test SSH connectivity with normal operations.

📡 Detection & Monitoring

Log Indicators:

  • Multiple SSH connection failures
  • Sysax service crash events in Windows Event Log
  • Unusual SSH packet patterns

Network Indicators:

  • Abnormal SSH traffic spikes
  • Malformed SSH packets to port 22
  • Connection floods from single source

SIEM Query:

source="Sysax" AND (event_id=1000 OR event_id=1001) OR dest_port=22 AND bytes>1000 AND protocol="SSH"

🔗 References

📤 Share & Export