CVE-2025-58443

9.1 CRITICAL

📋 TL;DR

This CVE describes an authentication bypass vulnerability in FOG Project versions 1.5.10.1673 and below that allows unauthenticated attackers to dump the entire SQL database. All organizations using vulnerable FOG Project installations are affected, potentially exposing sensitive system and user data.

💻 Affected Systems

Products:
  • FOG Project
Versions: 1.5.10.1673 and below
Operating Systems: Linux (various distributions)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database exfiltration including sensitive credentials, system configurations, and user data leading to full system compromise and data breach.

🟠

Likely Case

Unauthenticated attackers accessing and downloading the entire database, exposing sensitive information and potentially enabling further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to vulnerable systems.

🌐 Internet-Facing: HIGH - Directly exploitable without authentication, allowing remote attackers to dump the database.
🏢 Internal Only: HIGH - Even internal attackers or compromised systems can exploit this without credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated database dumping, making exploitation straightforward once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version of dev-branch or working-1.6 branch

Vendor Advisory: https://github.com/FOGProject/fogproject/security/advisories/GHSA-mvwm-9m2h-87p9

Restart Required: Yes

Instructions:

1. Backup current FOG installation and database. 2. Upgrade to latest version of either dev-branch or working-1.6 branch. 3. Follow FOG Project documentation: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version. 4. Restart FOG services.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to FOG server to only trusted IP addresses/networks

# Example iptables rule: iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
# Example iptables rule: iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT

🧯 If You Can't Patch

  • Isolate FOG server from internet and restrict internal network access to only necessary systems
  • Implement strict firewall rules and monitor for unusual database access patterns

🔍 How to Verify

Check if Vulnerable:

Check FOG version: cat /opt/fog/.fogsettings | grep version or check web interface version

Check Version:

cat /opt/fog/.fogsettings | grep version

Verify Fix Applied:

Verify version is above 1.5.10.1673 and test authentication requirements for database access endpoints

📡 Detection & Monitoring

Log Indicators:

  • Unusual database dump operations
  • Unauthenticated access to database endpoints
  • Large data transfers from FOG server

Network Indicators:

  • Unusual SQL queries from unauthenticated sources
  • Large data transfers on database ports

SIEM Query:

source="fog_logs" AND ("database dump" OR "unauthorized access" OR "authentication bypass")

🔗 References

📤 Share & Export