Description
A critical remote code execution (RCE) vulnerability, tracked as CVE-2024-52875, has been identified in GFI KerioControl firewalls, leaving over 12,000 instances exposed to potential exploitation. KerioControl is a widely used network security solution designed for small and medium-sized businesses, providing VPN services, bandwidth management, reporting and monitoring, traffic filtering, antivirus protection, and intrusion prevention. The vulnerability, discovered by security researcher Egidio Romano (EgiX) in mid-December 2024, allows attackers to execute arbitrary code remotely with minimal effort. Despite security updates being released, a significant number of vulnerable instances remain exposed, increasing the risk of cyberattacks.
Attack Details
The vulnerability stems from improper input validation in certain pages of the KerioControl web interface. The dest GET parameter is not adequately sanitized before being used to generate a “Location” HTTP header in a 302 HTTP response. This flaw allows attackers to perform HTTP Response Splitting attacks, which can lead to Reflected Cross-Site Scripting (XSS) and potentially enable one-click RCE attacks.
An attacker can craft a malicious URL that, when clicked by a logged-in administrator, executes arbitrary code on the firewall. This allows threat actors to compromise network security, steal credentials, and gain unauthorized access to sensitive systems. Despite the security update released in version 9.4.5 Patch 1 on December 19, 2024, thousands of instances remained vulnerable well into January 2025. Active exploitation attempts leveraging the public proof-of-concept (PoC) exploit were first observed by Greynoise early last month. More recently, The Shadowserver Foundation has detected 12,229 exposed KerioControl firewalls being targeted by cybercriminals.
Indicators of Compromise (IOCs)
Security researchers and monitoring services have identified the following IOCs related to attacks leveraging CVE-2024-52875:
Remediation
To mitigate the risk associated with CVE-2024-52875, organizations using KerioControl must take immediate action:
Organizations that have yet to apply the security patch remain at high risk of exploitation. Immediate action is crucial to safeguard systems from potential attacks leveraging CVE-2024-52875. The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: Over 12,000 KerioControl Firewalls Exposed to Critical RCE Vulnerability
References