CVE-2024-58275

N/A Unknown

📋 TL;DR

Easywall 0.3.1 contains an authenticated remote command execution vulnerability in the /ports-save endpoint. Attackers with valid credentials can inject shell metacharacters to execute arbitrary commands on the server. This affects all systems running Easywall 0.3.1 with the vulnerable endpoint exposed.

💻 Affected Systems

Products:
  • Easywall
Versions: 0.3.1
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to exploit, but default installations with exposed web interface are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root privileges, installing persistent backdoors, exfiltrating sensitive data, and pivoting to other network systems.

🟠

Likely Case

Unauthorized command execution leading to service disruption, data theft, or deployment of cryptocurrency miners or ransomware.

🟢

If Mitigated

Limited impact due to network segmentation, minimal user privileges, and proper input validation preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available on Exploit-DB and other sources, making this easily weaponizable by attackers with valid credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch exists. Consider upgrading to a newer version if available, or implement workarounds and mitigations.

🔧 Temporary Workarounds

Disable /ports-save endpoint

linux

Remove or restrict access to the vulnerable endpoint

# Configure web server to block /ports-save endpoint
# Example for nginx: location /ports-save { deny all; }
# Example for Apache: <Location /ports-save> Require all denied </Location>

Implement input validation

linux

Add input sanitization to reject shell metacharacters

# Modify the Easywall source code to validate input
# Example Python: import re; if re.search(r'[;&|`$()]', user_input): reject

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Easywall instances from critical systems
  • Enforce strong authentication policies and monitor for suspicious login attempts

🔍 How to Verify

Check if Vulnerable:

Check if running Easywall version 0.3.1 and if the /ports-save endpoint is accessible

Check Version:

Check Easywall configuration files or package manager for version information

Verify Fix Applied:

Test if command injection is possible by attempting to inject shell metacharacters into the /ports-save endpoint

📡 Detection & Monitoring

Log Indicators:

  • Unusual commands in system logs originating from Easywall process
  • Multiple failed authentication attempts followed by successful login and command execution

Network Indicators:

  • Unusual outbound connections from Easywall server
  • Traffic patterns indicating command and control communication

SIEM Query:

source="easywall.log" AND ("ports-save" OR command_injection_indicators)

🔗 References

📤 Share & Export