← Advisories

FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 Remote Privilege Escalation

High
Advisory ID
ZSL-2021-5685
Release Date
27 September 2021
Vendor
FatPipe Networks Inc. - https://www.fatpipeinc.com
Affected Version
WARP / IPVPN / MPVPN, 10.2.2r38, 10.2.2r25, 10.2.2r10, 10.1.2r60p82, 10.1.2r60p71, 10.1.2r60p65, 10.1.2r60p58s1, 10.1.2r60p58, 10.1.2r60p55, 10.1.2r60p45, 10.1.2r60p35, 10.1.2r60p32, 10.1.2r60p13, 10.1.2r60p10, 9.1.2r185, 9.1.2r180p2, 9.1.2r165, 9.1.2r164p5, 9.1.2r164p4, 9.1.2r164, 9.1.2r161p26, 9.1.2r161p20, 9.1.2r161p17, 9.1.2r161p16, 9.1.2r161p12, 9.1.2r161p3, 9.1.2r161p2, 9.1.2r156, 9.1.2r150, 9.1.2r144, 9.1.2r129, 7.1.2r39, 6.1.2r70p75-m, 6.1.2r70p45-m, 6.1.2r70p26, 5.2.0r34
Tested On
Apache-Coyote/1.1
Summary

FatPipe Networks invented the concept of router-clustering, which provides the highest level of reliability, redundancy, and speed of Internet traffic for Business Continuity and communications. FatPipe WARP achieves fault tolerance for companies by creating an easy method of combining two or more Internet connections of any kind over multiple ISPs. FatPipe utilizes all paths when the lines are up and running, dynamically balancing traffic over the multiple lines, and intelligently failing over inbound and outbound IP traffic when ISP services and/or components fail.

FatPipe IPVPN balances load and provides reliability among multiple managed and CPE based VPNs as well as dedicated private networks. FatPipe IPVPN can also provide you an easy low-cost migration path from private line, Frame or Point-to-Point networks. You can aggregate multiple private, MPLS and public networks without additional equipment at the provider's site.

FatPipe MPVPN, a patented router clustering device, is an essential part of Disaster Recovery and Business Continuity Planning for Virtual Private Network (VPN) connectivity. It makes any VPN up to 900% more secure and 300% times more reliable, redundant and faster. MPVPN can take WANs with an uptime of 99.5% or less and make them 99.999988% or higher, providing a virtually infallible WAN. MPVPN dynamically balances load over multiple lines and ISPs without the need for BGP programming. MPVPN aggregates up to 10Gbps - 40Gbps of bandwidth, giving you all the reliability and speed you need to keep your VPN up and running despite failures of service, line, software, or hardware.

Description

The application suffers from a privilege escalation vulnerability. A normal user (group USER, 0) can elevate her privileges by sending a HTTP POST request and setting the JSON parameter 'privilege' to integer value '1' gaining administrative rights (group ADMINISTRATOR, 1).

Proof of Concept
Disclosure Timeline
30.05.2016Vulnerability discovered.
25.07.2021Vulnerability discovered.
25.07.2021Vendor contacted.
27.07.2021No response from the vendor.
28.07.2021Vendor contacted.
06.08.2021No response from the vendor.
07.08.2021Vendor contacted.
09.08.2021CISA contacted.
09.08.2021CISA asks for more details.
09.08.2021Sent details to CISA.
10.08.2021CISA asked if the vulnerabilities were previously reported and which contacts did ZSL used initially.
10.08.2021Replied to CISA.
10.08.2021CISA will reach out to the vendor.
16.08.2021Asked CISA for status update.
17.08.2021CISA responds that the vendor replied and is reviewing the information.
17.08.2021CISA responds, vendor pushed updates to address the reported issues.
17.08.2021Replied to CISA, asked for patch release plan and coordination of advisory release.
18.08.2021Working with CISA and FatPipe.
20.08.2021Vendor released advisory: https://www.fatpipeinc.com/support/advisories.php
23.08.2021Working with the vendor.
24.08.2021Sent draft advisories to vendor. Asked for fixed version number. Informed that the advisories will be released mid September.
25.08.2021Asked vendor for confirmation of PoCs receipt.
30.08.2021Further discussion with the vendor about the vulnerabilities.
07.09.2021Asked vendor for status update.
10.09.2021Vendor requests more details.
10.09.2021Provided further details to the vendor.
14.09.2021Informed the vendor that advisories will be released 27th September.
19.09.2021Informed CISA about our release plan.
27.09.2021Coordinated public security advisory released.
27.09.2021Vendor provides fixed versions 10.1.2r60p92 and 10.2.2r43, and for 9.1.2: 9.1.2r161p31 and 9.1.2r180p9.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
27.09.2021Initial release
30.09.2021Added reference [2], [3], [4], [5] and [6]
04.10.2021Added reference [7]
21.11.2021Added reference [8], [9], [10], [11], [12] and [13]
11.01.2022Added reference [14]
01.02.2022Added reference [15] and [16]