CVE-2024-8073

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in Hillstone Networks Web Application Firewall that allows attackers to execute arbitrary commands on the affected system. The vulnerability affects Hillstone Networks Web Application Firewall versions 5.5R6-2.6.7 through 5.5R6-2.8.13. Attackers can exploit this to gain unauthorized access and control over the firewall device.

💻 Affected Systems

Products:
  • Hillstone Networks Web Application Firewall
Versions: 5.5R6-2.6.7 through 5.5R6-2.8.13
Operating Systems: Hillstone proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments running affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with high privileges, potentially leading to data exfiltration, lateral movement, or deployment of ransomware.

🟠

Likely Case

Attackers gain shell access to the firewall device, allowing them to modify configurations, disable security controls, or use the device as a pivot point into the network.

🟢

If Mitigated

If proper network segmentation and access controls are in place, impact may be limited to the firewall device itself without allowing lateral movement.

🌐 Internet-Facing: HIGH - Web Application Firewalls are typically internet-facing, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability if they have network access to the WAF management interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Command injection vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5R6-2.8.14 or later

Vendor Advisory: https://www.hillstonenet.com.cn/security-notification/2024/08/21/mlzrld-2/

Restart Required: Yes

Instructions:

1. Download the latest firmware from Hillstone support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or CLI. 4. Reboot the device. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Management Access

all

Limit access to the WAF management interface to trusted IP addresses only.

Configure firewall rules to restrict access to management IP/port

Disable Unnecessary Features

all

Disable any unnecessary web management features or APIs that might be vulnerable.

Review and disable non-essential management interfaces

🧯 If You Can't Patch

  • Isolate the WAF device in a dedicated network segment with strict access controls
  • Implement network monitoring and intrusion detection specifically for the WAF management interface

🔍 How to Verify

Check if Vulnerable:

Check the firmware version via web interface (System > System Information) or CLI command 'show version'

Check Version:

show version

Verify Fix Applied:

Verify firmware version is 5.5R6-2.8.14 or later using the same methods

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts followed by successful access
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from WAF device
  • Traffic patterns inconsistent with normal WAF operations

SIEM Query:

source="hillstone_waf" AND (event_type="command_execution" OR event_type="system_alert")

🔗 References

📤 Share & Export