CVE-2025-29556

7.3 HIGH

📋 TL;DR

CVE-2025-29556 is an access control bypass vulnerability in ExaGrid EX10 backup appliances that allows authenticated administrators to create or modify Security Officer accounts without required approval. This enables privilege escalation within the system. Organizations using ExaGrid EX10 appliances versions 6.3 through 7.0.1.P08 are affected.

💻 Affected Systems

Products:
  • ExaGrid EX10 Backup Appliance
Versions: 6.3 through 7.0.1.P08
Operating Systems: ExaGrid proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin access to exploit. All deployments with affected versions are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin access could create unauthorized Security Officer accounts, gaining full administrative privileges to manipulate backup data, disable security controls, or exfiltrate sensitive backup information.

🟠

Likely Case

Malicious insider or compromised admin account creates unauthorized privileged accounts to maintain persistence or bypass security monitoring within the backup environment.

🟢

If Mitigated

With proper network segmentation and API request validation, the attack would be detected or prevented before successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin credentials and ability to intercept/modify API requests. Public proof-of-concept demonstrates the bypass technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.0.1.P09 or later

Vendor Advisory: https://www.exagrid.com/

Restart Required: Yes

Instructions:

1. Log into ExaGrid management interface. 2. Navigate to System > Software Update. 3. Download and apply version 7.0.1.P09 or later. 4. Reboot appliance when prompted.

🔧 Temporary Workarounds

API Request Validation

all

Implement API gateway or WAF rules to validate user creation requests and block unauthorized role assignments

Role-Based Access Monitoring

all

Enable detailed audit logging for all user creation/modification events and implement real-time alerts for Security Officer role changes

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ExaGrid management interfaces from general admin access
  • Enforce multi-factor authentication for all admin accounts and implement privileged access management controls

🔍 How to Verify

Check if Vulnerable:

Check ExaGrid appliance version via web interface: System > About. If version is between 6.3 and 7.0.1.P08 inclusive, system is vulnerable.

Check Version:

curl -k -u admin:password https://<exagrid-ip>/api/system/version

Verify Fix Applied:

After patching, verify version is 7.0.1.P09 or later. Test user creation via API with Security Officer role assignment - should be blocked without approval.

📡 Detection & Monitoring

Log Indicators:

  • API requests creating/modifying users with Security Officer role without approval workflow
  • Unusual user creation patterns from admin accounts

Network Indicators:

  • POST requests to /api/users with role parameter set to Security Officer
  • Modified API requests bypassing normal user creation workflow

SIEM Query:

source="exagrid" AND (event_type="user_creation" OR event_type="user_modification") AND user_role="Security Officer" AND approval_workflow="false"

🔗 References

📤 Share & Export