Arbitrary Network Traffic Execution via SSRF in Havoc 2.0.7
CVE-2024-41570

9.8CRITICAL

Key Information:

Vendor

Havoc 2

Status
Vendor
CVE Published:
12 August 2024

Badges

👾 Exploit Exists🟡 Public PoC🟣 EPSS 52%

What is CVE-2024-41570?

CVE-2024-41570 is a significant vulnerability identified in Havoc 2, a command and control (C2) framework commonly utilized for managing servers and devices within various network environments. This vulnerability involves an Unauthenticated Server-Side Request Forgery (SSRF) that allows attackers to send arbitrary network traffic from the compromised Havoc 2 server. By exploiting this vulnerability, malicious actors can potentially perform unauthorized actions within the network, significantly compromising the integrity and security of affected organizations.

Technical Details

The vulnerability is rooted in an issue with the handling of demon callbacks in Havoc version 2.0.7. It enables attackers to manipulate server-side requests that the C2 framework makes, targeting internal and external resources without proper authentication. This means that an attacker can send requests to any IP address, gaining the ability to probe internal network services, access sensitive data, or exploit further vulnerabilities within the network infrastructure. Such capabilities could enhance an attacker's position significantly, allowing for deeper infiltration into organizational systems.

Potential impact of CVE-2024-41570

  1. Unauthorized Access to Internal Resources: Exploitation of this vulnerability could permit attackers to access and interact with internal network services, leading to unauthorized data exposure or manipulation, and potentially escalating the attack further within the organization.

  2. Data Breaches: With the capacity to query sensitive databases or services, attackers may extract confidential data, including personally identifiable information (PII) or proprietary intellectual property, posing severe risks to organizational privacy and compliance with data protection regulations.

  3. Facilitated Malicious Activities: By leveraging the compromised server's capabilities, attackers could launch additional exploits or attacks against other targets, such as using the C2 server as a pivot point to launch further intrusions or to host additional malicious payloads, thereby expanding the attack surface significantly.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

52% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.