CVE-2025-34180

N/A Unknown

📋 TL;DR

This vulnerability allows attackers to recover the plaintext Gateway Key from NetSupport Manager client configuration files due to reversible encoding. Possession of this key enables unauthorized access to connectivity services and remote control of systems managed with the same key. Organizations using NetSupport Manager versions before 14.12.0001 are affected.

💻 Affected Systems

Products:
  • NetSupport Manager
Versions: All versions < 14.12.0001
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using the default Gateway Key storage mechanism are vulnerable. The vulnerability requires access to client configuration files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all systems managed with the same Gateway Key, enabling remote code execution, data theft, and lateral movement across the entire managed environment.

🟠

Likely Case

Unauthorized access to connectivity services leading to remote control of vulnerable systems, potentially enabling credential harvesting, data exfiltration, and persistence establishment.

🟢

If Mitigated

Limited impact through network segmentation and proper access controls, though the authentication bypass remains possible if configuration files are accessible.

🌐 Internet-Facing: MEDIUM - Risk depends on whether connectivity services are exposed to the internet and if configuration files are accessible via other vulnerabilities.
🏢 Internal Only: HIGH - Internal attackers with access to client configuration files can recover the Gateway Key and gain unauthorized access to managed systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to client configuration files, which may be obtained through other vulnerabilities or improper permissions. The decoding process for the reversible encoding is publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.12.0001

Vendor Advisory: https://kb.netsupportsoftware.com/knowledge-base/updating-and-securing-netsupport-manager/

Restart Required: Yes

Instructions:

1. Download NetSupport Manager version 14.12.0001 or later from the official vendor portal. 2. Deploy the update to all Manager/Control, Client, and Connectivity Server components. 3. Restart all NetSupport Manager services. 4. Generate new Gateway Keys for all deployments.

🔧 Temporary Workarounds

Restrict Configuration File Access

all

Apply strict file permissions to NetSupport Manager configuration files to prevent unauthorized access.

Windows: icacls "C:\Program Files\NetSupport\*" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F"
Linux: chmod 600 /opt/netsupport/config/*

Network Segmentation

all

Isolate NetSupport Manager connectivity services to trusted network segments only.

🧯 If You Can't Patch

  • Rotate Gateway Keys immediately and monitor for unauthorized access attempts
  • Implement strict access controls and audit all configuration file access

🔍 How to Verify

Check if Vulnerable:

Check NetSupport Manager version via Control Panel or registry: Windows: reg query "HKLM\SOFTWARE\NetSupport\NetSupport Manager" /v Version. Linux: Check /opt/netsupport/version.txt or equivalent.

Check Version:

Windows: reg query "HKLM\SOFTWARE\NetSupport\NetSupport Manager" /v Version. Linux: cat /opt/netsupport/version.txt

Verify Fix Applied:

Confirm version is 14.12.0001 or higher and verify new Gateway Keys have been generated and deployed.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with recovered Gateway Keys
  • Unauthorized access to configuration files
  • Unexpected remote control sessions

Network Indicators:

  • Unusual connections to NetSupport Manager ports (typically 443, 8080)
  • Traffic patterns indicating configuration file access

SIEM Query:

source="netsupport*" AND (event_type="auth_failure" OR file_access="*.cfg" OR session="unauthorized")

🔗 References

📤 Share & Export