Critical vulnerability discovered in Helix Core Server could give full system control to hackers
Four vulnerabilities have been discovered by Microsoft in the Perforce Helix Core Server, one of which allows an intruder to remotely execute commands from the 'LocalSystem' account.
Helix Core Server provides a single location to store and access digital content, often used to store code, and enables improved workflow by allowing multiple users to access the same file content and its history.
The software is used by Microsoft's game developers and the vulnerabilities were discovered during a security assessment of the product. It is widely used in a range of other sectors including government, military and technology.
High scores across the board
Three of the vulnerabilities received a CVSS score of 7.5 and involved the use of remote commands or exploitation of the RPC header to cause a Denial of Service (DoS). However, the most dangerous vulnerability received a CVSS score of 9.8 and a 'critical' rating because the vulnerability allows threat actors to remotely execute code as a LocalSystem user.
This is especially dangerous because the LocalSystem user is primarily used to perform system functions and has privileged access to system files and other sensitive resources. This means that if this vulnerability were successfully exploited, it could surrender full control of the targeted system.
Additionally, this vulnerability also allows cybercriminals to install backdoors, allowing them to gain access to systems at a later date to steal sensitive information or plan a ransomware attack.
The full list of vulnerabilities as summarized in the NIST National Vulnerability Database is:
- CVE-2023-5759 (CVSS score 7.5): Unauthenticated (DoS) via RPC header abuse.
- CVE-2023-45849 (CVSS score 9.8): Unauthenticated remote code execution as LocalSystem.
- CVE-2023-35767 (CVSS score 7.5): Unverified DoS via remote control.
- CVE-2023-45319 (CVSS score 7.5): Unverified DoS via remote control.
Helix Core Server users can upgrade to the latest version, 2023.1/2513900, to protect themselves from this vulnerability, and Perforce has also provided a number of security recommendations in this regard. safety guide.
Through BleepingComputer