CVE-2024-8777

7.5 HIGH

📋 TL;DR

OMFLOW from The SYSCOM Group has an information leakage vulnerability that allows unauthorized remote attackers to read arbitrary system configurations. If LDAP authentication is enabled, attackers can obtain plaintext credentials. This affects all OMFLOW deployments with vulnerable versions.

💻 Affected Systems

Products:
  • OMFLOW
Versions: All versions before the fix
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: LDAP authentication must be enabled for credential exposure; configuration leakage occurs regardless of LDAP settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain LDAP service account credentials, potentially compromising the entire directory service and all systems that rely on it.

🟠

Likely Case

Attackers gain access to sensitive system configuration data and potentially LDAP credentials, leading to further system compromise.

🟢

If Mitigated

Limited exposure of non-critical configuration data without access to authentication systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated access to configuration endpoints, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version from vendor

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8072-928a5-2.html

Restart Required: Yes

Instructions:

1. Contact The SYSCOM Group for the latest patched version
2. Backup current configuration and data
3. Install the updated version following vendor instructions
4. Restart OMFLOW services
5. Verify the fix by testing the vulnerable endpoints

🔧 Temporary Workarounds

Disable LDAP Authentication

all

Temporarily disable LDAP authentication to prevent credential exposure while maintaining other functionality

Modify OMFLOW configuration to disable LDAP authentication

Network Access Control

all

Restrict access to OMFLOW web interface to trusted IP addresses only

Configure firewall rules to allow only authorized IPs to access OMFLOW ports

🧯 If You Can't Patch

  • Immediately disable LDAP authentication in OMFLOW configuration
  • Implement strict network segmentation and firewall rules to isolate OMFLOW from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Attempt to access OMFLOW configuration endpoints without authentication; if configuration data is returned, the system is vulnerable.

Check Version:

Check OMFLOW version through web interface or configuration files

Verify Fix Applied:

After patching, attempt to access the same configuration endpoints without authentication; access should be denied or return no sensitive data.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to configuration endpoints
  • Unusual LDAP authentication patterns
  • Multiple failed authentication attempts followed by configuration access

Network Indicators:

  • Unusual HTTP requests to configuration endpoints from untrusted sources
  • Traffic patterns indicating information gathering

SIEM Query:

source="omflow" AND (url="*config*" OR url="*setting*") AND user="-"

🔗 References

📤 Share & Export