CVE-2024-7323

6.5 MEDIUM

📋 TL;DR

Digiwin EasyFlow .NET has an access control vulnerability combined with insufficient input filtering, allowing authenticated remote attackers to download arbitrary files from the server. This affects organizations using vulnerable versions of Digiwin EasyFlow .NET workflow software. Regular users can exploit this to access sensitive system files.

💻 Affected Systems

Products:
  • Digiwin EasyFlow .NET
Versions: Specific versions not detailed in references, but all versions before patch are likely affected
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access, but regular user privileges are sufficient

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could download critical system files (passwords, configuration files, database credentials), leading to complete system compromise and data exfiltration.

🟠

Likely Case

Attackers download sensitive business documents, user data, or configuration files containing credentials, leading to data breach and potential lateral movement.

🟢

If Mitigated

With proper network segmentation and file system permissions, impact limited to accessible directories only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but appears straightforward based on vulnerability description

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-7990-87183-2.html

Restart Required: Yes

Instructions:

1. Contact Digiwin for patch information
2. Apply the latest security update
3. Restart the EasyFlow service
4. Verify the fix

🔧 Temporary Workarounds

Restrict File System Access

windows

Apply strict file system permissions to limit what directories the EasyFlow service account can access

icacls "C:\Program Files\Digiwin\" /deny EASYFLOW_SERVICE_ACCOUNT:(OI)(CI)(F)

Network Segmentation

all

Isolate EasyFlow servers from sensitive systems and limit user access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate EasyFlow servers
  • Apply principle of least privilege to file system and service accounts

🔍 How to Verify

Check if Vulnerable:

Check if you're running Digiwin EasyFlow .NET and review version against vendor advisory

Check Version:

Check application version in control panel or application interface

Verify Fix Applied:

Test if authenticated users can still access arbitrary files via the vulnerable functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from EasyFlow application
  • Multiple file download requests from single user session

Network Indicators:

  • Unexpected outbound file transfers from EasyFlow server

SIEM Query:

source="EasyFlow" AND (event="FileDownload" OR event="FileAccess") AND file_path CONTAINS ".."

🔗 References

📤 Share & Export