CVE-2025-66360

8.8 HIGH

📋 TL;DR

Logpoint versions before 7.7.0 have an access control misconfiguration that allows li-admin users to access sensitive Redis service information. This exposure can enable privilege escalation attacks. Only Logpoint deployments with li-admin users are affected.

💻 Affected Systems

Products:
  • Logpoint
Versions: All versions before 7.7.0
Operating Systems: All supported Logpoint OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with li-admin users configured. The vulnerability exists in the access control policy configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with li-admin access could exploit Redis access to gain full administrative control over the Logpoint system, potentially compromising all monitored data and system integrity.

🟠

Likely Case

Malicious insiders or compromised li-admin accounts could escalate privileges to gain unauthorized access to sensitive system data and configurations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized li-admin users who would not abuse their privileges.

🌐 Internet-Facing: LOW - This vulnerability requires li-admin user access, which is typically not exposed to the internet.
🏢 Internal Only: HIGH - Internal users with li-admin privileges can exploit this vulnerability to escalate privileges within the Logpoint environment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires li-admin user credentials. The vulnerability involves accessing exposed Redis service information that should be restricted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.7.0

Vendor Advisory: https://servicedesk.logpoint.com/hc/en-us/articles/29160917867549-Redis-communication-exposed-for-internal-communication

Restart Required: Yes

Instructions:

1. Backup Logpoint configuration and data. 2. Upgrade to Logpoint version 7.7.0 or later. 3. Restart Logpoint services. 4. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Restrict li-admin access

all

Temporarily remove or restrict li-admin user accounts until patching can be completed.

# Review and modify li-admin user accounts in Logpoint administration panel
# Consider implementing temporary access controls for li-admin users

Network segmentation

linux

Implement network controls to restrict access to Redis service ports from unauthorized users.

# Example firewall rule to restrict Redis port access
iptables -A INPUT -p tcp --dport 6379 -s trusted_ips -j ACCEPT
iptables -A INPUT -p tcp --dport 6379 -j DROP

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for all li-admin user accounts
  • Segment network access to Redis service and implement additional authentication layers

🔍 How to Verify

Check if Vulnerable:

Check Logpoint version: If version is below 7.7.0 and li-admin users exist, the system is vulnerable.

Check Version:

logpoint-cli version

Verify Fix Applied:

After upgrading to 7.7.0 or later, verify that li-admin users cannot access Redis service information through Logpoint interfaces.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Redis service
  • Unusual li-admin user activity patterns
  • Privilege escalation attempts in Logpoint audit logs

Network Indicators:

  • Unexpected connections to Redis port (default 6379) from li-admin user workstations
  • Redis protocol traffic from unauthorized sources

SIEM Query:

source="logpoint" (user="*li-admin*" AND (resource="redis" OR port=6379))

🔗 References

📤 Share & Export