CVE-2024-6466

5.3 MEDIUM

📋 TL;DR

This vulnerability in NEC WebSAM DeploymentManager allows attackers to reset configurations or restart products via network requests when X-FRAME-OPTIONS headers are not properly configured. It affects WebSAM DeploymentManager versions 6.0 through 6.80. Attackers can exploit this without authentication if they can reach the vulnerable interface.

💻 Affected Systems

Products:
  • NEC WebSAM DeploymentManager
Versions: v6.0 to v6.80
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when X-FRAME-OPTIONS header is not specified, which appears to be the default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could reset critical system configurations or cause service disruption through forced restarts, potentially leading to extended downtime or misconfigured systems.

🟠

Likely Case

Attackers with network access could cause temporary service interruptions by restarting products or resetting non-critical configurations.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to authorized users who might accidentally trigger these actions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the vulnerable interface but no authentication. The advisory suggests it can be triggered via web requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v6.81 or later

Vendor Advisory: https://jpn.nec.com/security-info/secinfo/nv15-019_en.html

Restart Required: Yes

Instructions:

1. Download WebSAM DeploymentManager v6.81 or later from NEC. 2. Backup current configuration. 3. Install the updated version following NEC's installation guide. 4. Restart the service to apply changes.

🔧 Temporary Workarounds

Configure X-FRAME-OPTIONS header

all

Add X-FRAME-OPTIONS header to web server configuration to prevent clickjacking-style attacks

For Apache: Header always append X-Frame-Options SAMEORIGIN
For Nginx: add_header X-Frame-Options SAMEORIGIN;

Network segmentation

all

Restrict network access to WebSAM DeploymentManager interface to trusted networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the WebSAM DeploymentManager interface
  • Monitor for configuration reset or restart events and implement alerting for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check WebSAM DeploymentManager version via web interface or configuration files. If version is between 6.0 and 6.80, system is vulnerable.

Check Version:

Check web interface or consult NEC documentation for version checking method

Verify Fix Applied:

Verify version is 6.81 or later. Test that configuration reset and restart functions require proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected configuration reset events
  • Unexpected service restarts
  • Access from unauthorized IP addresses to administrative endpoints

Network Indicators:

  • HTTP requests to configuration/reset or restart endpoints from unexpected sources
  • Lack of X-FRAME-OPTIONS headers in responses

SIEM Query:

source="websam" AND (event="configuration_reset" OR event="service_restart")

🔗 References

📤 Share & Export