CVE-2025-3361

9.8 CRITICAL

📋 TL;DR

CVE-2025-3361 is an unauthenticated OS command injection vulnerability in HGiga iSherlock web service that allows remote attackers to execute arbitrary commands on the server. This affects all organizations using vulnerable versions of iSherlock, potentially exposing their entire server environment to compromise.

💻 Affected Systems

Products:
  • HGiga iSherlock
Versions: Versions prior to 2025.1.15
Operating Systems: Linux-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with web service enabled are vulnerable. No authentication required to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover leading to data exfiltration, ransomware deployment, lateral movement to internal networks, and persistent backdoor installation.

🟠

Likely Case

Initial foothold on the server leading to credential harvesting, data theft, and deployment of cryptocurrency miners or botnet clients.

🟢

If Mitigated

Limited impact due to network segmentation, minimal privileges, and command execution restrictions, though initial access still achieved.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request with command injection payloads can trigger exploitation. Public proof-of-concept available in CERT advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.1.15 or later

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-10051-76634-1.html

Restart Required: Yes

Instructions:

1. Download latest version from HGiga official website. 2. Backup current configuration. 3. Stop iSherlock service. 4. Install updated version. 5. Restart service and verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict access to iSherlock web service to trusted IP addresses only

iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

Web Application Firewall

all

Deploy WAF with OS command injection rules to block exploitation attempts

🧯 If You Can't Patch

  • Isolate iSherlock server in separate network segment with strict egress filtering
  • Implement application-level input validation and sanitization for all user inputs

🔍 How to Verify

Check if Vulnerable:

Check iSherlock version via web interface or configuration files. Versions before 2025.1.15 are vulnerable.

Check Version:

grep -i version /opt/isherlock/config/version.conf

Verify Fix Applied:

Verify version is 2025.1.15 or later and test with safe command injection payloads that should be rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • HTTP requests containing shell metacharacters like ;, |, &, $()
  • Multiple failed authentication attempts followed by command execution

Network Indicators:

  • HTTP POST requests to iSherlock endpoints with command injection patterns
  • Outbound connections from iSherlock server to unusual destinations

SIEM Query:

source="iSherlock" AND (http_uri="*;*" OR http_uri="*|*" OR http_uri="*$(*" OR http_uri="*`*`)

🔗 References

📤 Share & Export