ID

VAR-202203-0548


CVE

CVE-2021-45491


TITLE

3CX  of  3cx  Vulnerability in plaintext storage of important information in

Trust: 0.8

sources: JVNDB: JVNDB-2021-019014

DESCRIPTION

3CX System through 2022-03-17 stores cleartext passwords in a database. 3CX of 3cx There is a vulnerability in plaintext storage of important information.Information may be obtained. 3CX Phone is a software-based private branch switch. This product can be used with SIP standard-based IP phones, SIP trunks and VoIP gateways to provide a complete communication solution. The 3CX Phone System has a security vulnerability that stems from the fact that the 3CX Phone System stores passwords in clear text and makes them exportable in the management interface. No detailed vulnerability details are currently provided. ############################################################# # # COMPASS SECURITY ADVISORY # https://www.compass-security.com/research/advisories/ # ############################################################# # # Product: 3CX Phone System # Vendor: 3CX # CSNC ID: CSNC-2021-022 # CVE ID: CVE-2021-45491 # Subject: Exportable Cleartext Passwords # CWE-ID: CWE-257 (Storing Passwords in a Recoverable Format) # Severity: Medium # Effect: Credential Reuse # Author: Emanuel Duss <emanuel.duss@compass-security.com> # Date: 2022-03-17 # ############################################################# Introduction ------------ 3CX is an open-platform office phone system that runs on premise on Windows or Linux. 3CX was built for mobility, with remote work apps that offer secured communication for the whole team. With the Android, iOS and Windows apps, business communication is no longer tied to the office building. [1] During a customer project, we identified a security vulnerability in the 3CX system. Affected -------- - All versions of the 3CX application are affected. - There is no fix from the vendor. This can be verified by exporting the credentials via the admin interface or by looking into the SQL database. This issue is also already documented in the community forum since 2019 [2]. The storage of passwords in a recoverable format makes them subject to password reuse attacks by malicious users. In fact, it should be noted that recoverable encrypted passwords provide no significant benefit over plaintext passwords since they are subject not only to reuse by malicious attackers but also by malicious insiders. If a system administrator can recover a password directly, or use a brute force search on the available information, the administrator can use the password on other accounts. [3] Vulnerability Classification ---------------------------- CVSS v3.1 Metrics [4]: - CVSS Base Score: 5.5 (Medium) - CVSS Vector: AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N Workaround / Fix ---------------- # 3CX Vendor A password hash function such as PBKDF2, bcrypt or scrypt should be used for passwords. The passwords should also be provided with a salt that is generated individually for each user. This can make attacks that use rainbow tables or pre-calculated wordlists more difficult. # 3CX Users There is no security update for this vulnerability at the moment. According to the 3CX, the vulnerability will be tackled in future redesigns of the management console. Timeline -------- 2021-12-16: Vulnerability discovered 2021-12-17: Discussed vulnerability with our customer Asked 3CX for security contact on Twitter, community forum, support email and contact form. Got response via support mail. Security contact was dpo@3cx.com Provided details Requested CVE ID @ MITRE 2021-12-25: Assigned CVE-2021-45491 2022-01-03: Asked vendor if they understood the vulnerability. Answer: Report was distributed internally. 2022-01-18: Asked vendor for any updates. 2022-02-02: Asked vendor for any updates. 2022-02-10: Asked vendor for any updates. 3CX can't tell when the issue will be fixed. 2022-03-11: Asked vendor for any updates. 3CX thanked for the report. Issues will be tackled in future redesigns of the management console. 2022-03-17: Coordinated public disclosure Acknowledgement --------------- Thanks 3CX for the coordinated disclosure. References ---------- [1] https://www.3cx.com/ [2] https://www.3cx.de/forum/threads/klartext-passwort-willkommen-mail-also-auch-in-db.94280/ [3] https://cwe.mitre.org/data/definitions/257.html [4] https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N&version=3.1

Trust: 2.34

sources: NVD: CVE-2021-45491 // JVNDB: JVNDB-2021-019014 // CNVD: CNVD-2022-29580 // VULMON: CVE-2021-45491 // PACKETSTORM: 166386

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-29580

AFFECTED PRODUCTS

vendor:3cxmodel:3cxscope:lteversion:2022-03-17

Trust: 1.0

vendor:3cxmodel:3cxscope: - version: -

Trust: 0.8

vendor:3cxmodel:3cxscope:lteversion:2022-03-17 and earlier

Trust: 0.8

vendor:3cxmodel:3cxscope:eqversion: -

Trust: 0.8

vendor:3cxmodel:phonescope:ltversion:2022-03-17

Trust: 0.6

sources: CNVD: CNVD-2022-29580 // JVNDB: JVNDB-2021-019014 // NVD: CVE-2021-45491

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45491
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-45491
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2022-29580
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202203-1924
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-45491
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-45491
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2022-29580
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-45491
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-45491
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-29580 // VULMON: CVE-2021-45491 // JVNDB: JVNDB-2021-019014 // CNNVD: CNNVD-202203-1924 // NVD: CVE-2021-45491

PROBLEMTYPE DATA

problemtype:CWE-312

Trust: 1.0

problemtype:Plaintext storage of important information (CWE-312) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-019014 // NVD: CVE-2021-45491

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202203-1924

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202203-1924

PATCH

title: - url:https://www.theregister.co.uk/2023/04/12/3cx_client_update_for_security/

Trust: 0.1

sources: VULMON: CVE-2021-45491

EXTERNAL IDS

db:NVDid:CVE-2021-45491

Trust: 4.0

db:PACKETSTORMid:166386

Trust: 3.2

db:JVNDBid:JVNDB-2021-019014

Trust: 0.8

db:CNVDid:CNVD-2022-29580

Trust: 0.6

db:CXSECURITYid:WLB-2022030096

Trust: 0.6

db:CNNVDid:CNNVD-202203-1924

Trust: 0.6

db:VULMONid:CVE-2021-45491

Trust: 0.1

sources: CNVD: CNVD-2022-29580 // VULMON: CVE-2021-45491 // JVNDB: JVNDB-2021-019014 // PACKETSTORM: 166386 // CNNVD: CNNVD-202203-1924 // NVD: CVE-2021-45491

REFERENCES

url:http://packetstormsecurity.com/files/166386/3cx-phone-system-cleartext-passwords.html

Trust: 3.7

url:https://www.3cx.com/community/forums/posts-articles-news/

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-45491

Trust: 0.9

url:https://cxsecurity.com/issue/wlb-2022030096

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2021-45491/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/312.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.theregister.co.uk/2023/04/12/3cx_client_update_for_security/

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/257.html

Trust: 0.1

url:https://www.3cx.de/forum/threads/klartext-passwort-willkommen-mail-also-auch-in-db.94280/

Trust: 0.1

url:https://www.compass-security.com/research/advisories/

Trust: 0.1

url:https://www.3cx.com/

Trust: 0.1

url:https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=av:n/ac:l/pr:h/ui:n/s:c/c:l/i:l/a:n&version=3.1

Trust: 0.1

sources: CNVD: CNVD-2022-29580 // VULMON: CVE-2021-45491 // JVNDB: JVNDB-2021-019014 // PACKETSTORM: 166386 // CNNVD: CNNVD-202203-1924 // NVD: CVE-2021-45491

CREDITS

Emanuel Duss

Trust: 0.7

sources: PACKETSTORM: 166386 // CNNVD: CNNVD-202203-1924

SOURCES

db:CNVDid:CNVD-2022-29580
db:VULMONid:CVE-2021-45491
db:JVNDBid:JVNDB-2021-019014
db:PACKETSTORMid:166386
db:CNNVDid:CNNVD-202203-1924
db:NVDid:CVE-2021-45491

LAST UPDATE DATE

2024-11-23T22:47:29.740000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-29580date:2022-04-17T00:00:00
db:VULMONid:CVE-2021-45491date:2022-03-31T00:00:00
db:JVNDBid:JVNDB-2021-019014date:2023-07-13T08:30:00
db:CNNVDid:CNNVD-202203-1924date:2022-04-06T00:00:00
db:NVDid:CVE-2021-45491date:2024-11-21T06:32:19.773

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-29580date:2022-04-15T00:00:00
db:VULMONid:CVE-2021-45491date:2022-03-28T00:00:00
db:JVNDBid:JVNDB-2021-019014date:2023-07-13T00:00:00
db:PACKETSTORMid:166386date:2022-03-21T22:27:59
db:CNNVDid:CNNVD-202203-1924date:2022-03-21T00:00:00
db:NVDid:CVE-2021-45491date:2022-03-28T02:15:06.990