CVE-2021-30116
Scores
EPSS
Percentile: 54.1%
CVSS
CVSS Score: 9.8/10
All CVSS Scores
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Network (N)
Describes how the vulnerability is exploited
Attack Complexity
Low (L)
Describes the conditions beyond the attacker's control
Privileges Required
None (N)
Describes the level of privileges an attacker must possess
User Interaction
None (N)
Captures the requirement for a human user participation
Scope
Unchanged (U)
Determines if a successful attack impacts components beyond the vulnerable component
Confidentiality Impact
High (H)
Measures the impact to the confidentiality of information
Integrity Impact
High (H)
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
High (H)
Measures the impact to the availability of the impacted component
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Network (N)
Describes how the vulnerability is exploited
Attack Complexity
Low (L)
Describes the conditions beyond the attacker's control
Authentication
None (N)
Describes the level of privileges an attacker must possess
Confidentiality Impact
Partial
Measures the impact to the confidentiality of information
Integrity Impact
Partial
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
Partial
Measures the impact to the availability of the impacted component
Description
Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021. By default Kaseya VSA on premise offers a download page where the clients for the installation can be downloaded. The default URL for this page is https://x.x.x.x/dl.asp When an attacker download a client for Windows and installs it, the file KaseyaD.ini is generated (C:\Program Files (x86)\Kaseya\XXXXXXXXXX\KaseyaD.ini) which contains an Agent_Guid and AgentPassword This Agent_Guid and AgentPassword can be used to log in on dl.asp (https://x.x.x.x/dl.asp?un=840997037507813&pw=113cc622839a4077a84837485ced6b93e440bf66d44057713cb2f95e503a06d9) This request authenticates the client and returns a sessionId cookie that can be used in subsequent attacks to bypass authentication. Security issues discovered — * Unauthenticated download page leaks credentials * Credentials of agent software can be used to obtain a sessionId (cookie) that can be used for services not intended for use by agents * dl.asp accepts credentials via a GET request * Access to KaseyaD.ini gives an attacker access to sufficient information to penetrate the Kaseya installation and its clients. Impact — Via the page /dl.asp enough information can be obtained to give an attacker a sessionId that can be used to execute further (semi-authenticated) attacks against the system.
Scaner-VS 7 — a modern vulnerability management solution
Sources
CWEs
Related Vulnerabilities
Exploits
Exploit ID: CVE-2021-30116
Source: cisa
URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Vulnerable Software (2)
Type: Configuration
Vendor: *
Product: vsa_agent
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:kaseya:vsa_agent:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.5.0.24", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:kas...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:kaseya:vsa_agent:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.5.0.24", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:kaseya:vsa_server:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.5.7a", "vulnerable": true } ], "operator": "OR"}
Source: nvd
Type: Configuration
Vendor: *
Product: vsa_server
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:kaseya:vsa_agent:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.5.0.24", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:kas...
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:kaseya:vsa_agent:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.5.0.24", "vulnerable": true }, { "cpe23uri": "cpe:2.3:a:kaseya:vsa_server:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.5.7a", "vulnerable": true } ], "operator": "OR"}
Source: nvd