Security Experts:

Connect with us

Hi, what are you looking for?



Critical Vulnerabilities Found in Device42 Asset Management Platform

Bitdefender warns of multiple critical vulnerabilities in the Device42 asset management platform, including bugs that could be exploited to execute arbitrary code.

Bitdefender warns of multiple critical vulnerabilities in the Device42 asset management platform, including bugs that could be exploited to execute arbitrary code.

The Device42 platform helps administrators track applications, devices, and hardware, providing them with the ability to manage data center assets, passwords, and services, as well as with device discovery and asset tagging features.

This week, Bitdefender shared information on three critical vulnerabilities in the Device42 platform and one in the Device42 ApplianceManager console, warning that attackers could exploit these to achieve remote code execution.

“By exploiting these issues, an attacker could impersonate other users, obtain admin-level access in the application (by leaking session with an LFI) or obtain full access to the appliance files and database (through remote code execution),” Bitdefender says.

The company’s security researchers discovered that, because the platform did not properly validate provided paths, it was possible to read sensitive files on the server without authentication (CVE-2022-1401).

Because the platform contained hardcoded Exago encryption keys (CVE-2022-1400), an attacker could chain the two vulnerabilities to access files containing session IDs and decrypt them, and then bypass authentication by using the session information to access the application as an authenticated user.

Bitdefender also notes that the attacker could then exploit the third vulnerability in Device42 (CVE-2022-1399) to achieve remote code execution “by creating an autodiscovery task (*nix/CISCO NX-OS) with crafted RCE payload as username.”

The researchers warn that the manipulation of ssh bash command parameters would allow the attacker to execute code with root privileges.

“By daisy-chaining multiple vulnerabilities, an attacker can achieve remote code execution with root privileges starting from an unauthenticated session,” Bitdefender warns.

The researchers also discovered a remote code execution vulnerability in the Device42 Appliance Manager console, which requires valid credentials for exploitation. Those credentials, however, could be obtained by exploiting the aforementioned security bugs.

Bitdefender reported the vulnerabilities to the Device42 team in February, which resolved all issues with the release of Device42 version 18.01.00. Customers are advised to update to the patched version as soon as possible.

Related: Hundreds of ICS Vulnerabilities Disclosed in First Half of 2022

Related: Over 28,000 Vulnerabilities Disclosed in 2021: Report

Related: Cisco Patches Severe Vulnerabilities in Nexus Dashboard

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.


GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet