CVE-2024-54188

5.3 MEDIUM

📋 TL;DR

Infoblox NETMRI versions before 7.6.1 contain a vulnerability that allows remote authenticated users to read arbitrary files with root-level access. This affects organizations using Infoblox NETMRI for network automation and management. The vulnerability enables unauthorized access to sensitive system files.

💻 Affected Systems

Products:
  • Infoblox NETMRI
Versions: All versions before 7.6.1
Operating Systems: Linux-based systems running NETMRI
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to the NETMRI application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files like /etc/shadow, configuration files, SSH keys, or application secrets, potentially leading to credential theft, privilege escalation, or lateral movement.

🟠

Likely Case

Authenticated users (including compromised accounts) reading configuration files, logs, or other sensitive data stored on the file system.

🟢

If Mitigated

Limited impact with proper access controls, network segmentation, and monitoring in place.

🌐 Internet-Facing: MEDIUM - If NETMRI is exposed to the internet, authenticated attackers could exploit this remotely.
🏢 Internal Only: HIGH - Internal authenticated users (including compromised accounts) can exploit this vulnerability to access sensitive files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the NETMRI application interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.1

Vendor Advisory: https://support.infoblox.com/s/article/Infoblox-NetMRI-is-vulnerable-to-CVE-2024-54188

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download NETMRI 7.6.1 from Infoblox support portal. 3. Follow Infoblox upgrade documentation for your deployment type. 4. Apply the update and restart services.

🔧 Temporary Workarounds

Restrict NETMRI Access

all

Limit access to NETMRI interface to only trusted networks and users.

Configure firewall rules to restrict access to NETMRI ports (typically 443/HTTPS)

Review User Accounts

all

Audit and remove unnecessary user accounts, enforce strong authentication.

Review NETMRI user accounts via administration interface

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate NETMRI from sensitive systems
  • Enhance monitoring of file access patterns and user activity on NETMRI systems

🔍 How to Verify

Check if Vulnerable:

Check NETMRI version via web interface (Admin > System > About) or command line: cat /opt/netmri/version.txt

Check Version:

cat /opt/netmri/version.txt

Verify Fix Applied:

Confirm version is 7.6.1 or later using the same methods

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in NETMRI application logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from NETMRI system
  • Traffic patterns indicating file enumeration

SIEM Query:

source="netmri" AND (event="file_access" OR event="unauthorized_access")

🔗 References

📤 Share & Export