CVE-2026-1007

7.6 HIGH

📋 TL;DR

An incorrect authorization vulnerability in Devolutions Server's virtual gateway component allows attackers to bypass IP deny rules. This affects Devolutions Server installations running versions 2025.3.1 through 2025.3.12, potentially enabling unauthorized access to protected resources.

💻 Affected Systems

Products:
  • Devolutions Server
Versions: 2025.3.1 through 2025.3.12
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using the virtual gateway component with IP deny rules configured.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could bypass all IP-based access controls, gaining unauthorized access to sensitive systems and data through the virtual gateway.

🟠

Likely Case

Attackers bypass IP restrictions to access internal resources that should be blocked, potentially leading to data exposure or lateral movement.

🟢

If Mitigated

With proper network segmentation and additional authentication layers, impact is limited to the virtual gateway component only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the virtual gateway but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.3.13 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2026-0003/

Restart Required: Yes

Instructions:

1. Download Devolutions Server 2025.3.13 or later from official sources. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart Devolutions Server services.

🔧 Temporary Workarounds

Temporary IP Restriction via Firewall

all

Implement firewall rules to restrict access to the virtual gateway port from unauthorized IPs.

# Example for Linux iptables: iptables -A INPUT -p tcp --dport [VIRTUAL_GATEWAY_PORT] -s [ALLOWED_IP] -j ACCEPT
# Example for Windows Firewall: New-NetFirewallRule -DisplayName "Devolutions Gateway Restrict" -Direction Inbound -LocalPort [VIRTUAL_GATEWAY_PORT] -RemoteAddress [ALLOWED_IP] -Protocol TCP -Action Allow

🧯 If You Can't Patch

  • Disable the virtual gateway component if not essential.
  • Implement network-level IP filtering upstream of the Devolutions Server.

🔍 How to Verify

Check if Vulnerable:

Check Devolutions Server version in web interface (Admin → About) or via PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Devolutions Server*"} | Select-Object Version

Check Version:

On Windows: wmic product where "name like '%Devolutions Server%'" get version. On Linux: Check /opt/devolutions/server/version.txt or similar.

Verify Fix Applied:

Confirm version is 2025.3.13 or later and test IP deny rules functionality.

📡 Detection & Monitoring

Log Indicators:

  • Failed IP deny rule matches in Devolutions Server logs
  • Unexpected successful connections from blocked IP ranges

Network Indicators:

  • Traffic to virtual gateway port from IPs not in allowed list
  • Connection attempts bypassing expected IP filters

SIEM Query:

source="devolutions.log" AND ("IP deny bypass" OR "unauthorized connection" OR "rule violation")

🔗 References

📤 Share & Export