AD credentials can be leaked from the Management Interface for Cloud Access Connector (current and legacy)
Summary
An insufficiently protected credentials vulnerability has been identified in the Management Interface of the Cloud Access Connector and the Cloud Access Connector Legacy for releases from April 20, 2020 and earlier (v15 and earlier for Cloud Access Connector).
Affected releases have the potential to expose the Active Directory service account credentials that configured during Cloud Access Connector installation to an unauthenticated attacker of the service.
Severity
Critical
Affected Products
- Cloud Access Connector v15 and earlier
- Cloud Access Connector (Legacy) from April 20, 2020 and earlier
Available Updates
- Cloud Access Connector v16 and newer
- Cloud Access Connector (Legacy) update from April 20, 2020 onwards
Workarounds and Mitigations
Block or restrict network connectivity to https://<fqdn or ip address of Cloud Access Connector>/CloudAccessManager/
to trusted networks only to reduce the scope of exposure.
References
The following article describes this class of vulnerability (CWE-522: Insufficiently Protected Credentials): https://cwe.mitre.org/data/definitions/522.html
Acknowledgements
We would like to thank Michael Fowl and team of VDA Labs https://vdalabs.com/ team for finding and reporting this vulnerability.