Security Experts:

Connect with us

Hi, what are you looking for?



Critical Vulnerabilities Found in Device42 Asset Management Platform

Bitdefender warns of multiple critical vulnerabilities in the Device42 asset management platform, including bugs that could be exploited to execute arbitrary code.

Bitdefender warns of multiple critical vulnerabilities in the Device42 asset management platform, including bugs that could be exploited to execute arbitrary code.

The Device42 platform helps administrators track applications, devices, and hardware, providing them with the ability to manage data center assets, passwords, and services, as well as with device discovery and asset tagging features.

This week, Bitdefender shared information on three critical vulnerabilities in the Device42 platform and one in the Device42 ApplianceManager console, warning that attackers could exploit these to achieve remote code execution.

“By exploiting these issues, an attacker could impersonate other users, obtain admin-level access in the application (by leaking session with an LFI) or obtain full access to the appliance files and database (through remote code execution),” Bitdefender says.

The company’s security researchers discovered that, because the platform did not properly validate provided paths, it was possible to read sensitive files on the server without authentication (CVE-2022-1401).

Because the platform contained hardcoded Exago encryption keys (CVE-2022-1400), an attacker could chain the two vulnerabilities to access files containing session IDs and decrypt them, and then bypass authentication by using the session information to access the application as an authenticated user.

Bitdefender also notes that the attacker could then exploit the third vulnerability in Device42 (CVE-2022-1399) to achieve remote code execution “by creating an autodiscovery task (*nix/CISCO NX-OS) with crafted RCE payload as username.”

The researchers warn that the manipulation of ssh bash command parameters would allow the attacker to execute code with root privileges.

“By daisy-chaining multiple vulnerabilities, an attacker can achieve remote code execution with root privileges starting from an unauthenticated session,” Bitdefender warns.

The researchers also discovered a remote code execution vulnerability in the Device42 Appliance Manager console, which requires valid credentials for exploitation. Those credentials, however, could be obtained by exploiting the aforementioned security bugs.

Bitdefender reported the vulnerabilities to the Device42 team in February, which resolved all issues with the release of Device42 version 18.01.00. Customers are advised to update to the patched version as soon as possible.

Related: Hundreds of ICS Vulnerabilities Disclosed in First Half of 2022

Related: Over 28,000 Vulnerabilities Disclosed in 2021: Report

Related: Cisco Patches Severe Vulnerabilities in Nexus Dashboard

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.