TL;DR

["A critical vulnerability exists in GFI Archiver's MARC.Store component allowing remote attackers to bypass authentication without needing any credentials.", 'Exploitation requires no user interaction and can lead to full system compromise.']

What happened

['Remote unauthorized users can exploit a missing authorization flaw to gain access to GFI Archiver installations, leading to potential data breaches or system takeovers.']

Why it matters for ops

['This vulnerability undermines the security of affected systems by allowing unauthenticated access, enabling attackers to bypass critical security controls such as user authentication and authorization.']

Mitigation

  • Apply vendor-provided patches immediately to secure affected MARC.Store installations.
  • Disable unnecessary services and limit inbound traffic to essential ports only.

Action items

  • Update systems to the latest version with security fixes applied.
  • Review and enhance network segmentation policies, restricting access based on least privilege principles.

Detection IOCs

  • Unusual network traffic patterns targeting port 80 or 443 on the GFI Archiver server.
  • Unexpected administrative actions performed by unauthenticated users in system logs.

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-077/