CVE-2021-27561
Yealink Device Management vulnerability analysis and mitigation

Overview

Yealink Device Management (DM) version 3.6.0.20 and prior versions contain a critical remote code execution vulnerability identified as CVE-2021-27561. The vulnerability allows unauthenticated attackers to execute arbitrary commands with root privileges via the /sm/api/v1/firewall/zone/services URI. This vulnerability was discovered in February 2021 and publicly disclosed by security researchers Pierre Kim and Alexandre Torres through the SSD Secure Disclosure program (SSD Advisory).

Technical details

The vulnerability stems from a command injection flaw in the smserver daemon running as root on port 9600/tcp. The exploitation chain involves chaining a pre-authentication Server-Side Request Forgery (SSRF) vulnerability with a command injection vulnerability. The attack path flows through Nginx (port 443) to NodeJS (port 9880) and finally to smserver, where the command injection occurs in the fwrestfulserviceget() function located in the module /usr/local/yealink/smserver/mod/modfirewall.so. The vulnerability has received a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).

Impact

The vulnerability allows attackers to execute arbitrary commands with root-level privileges on the affected system without requiring authentication. This gives attackers complete control over the affected device, potentially enabling them to access sensitive information, modify system configurations, and use the compromised system as a foothold for further network attacks (SSD Advisory).

Mitigation and workarounds

Yealink indicated they would release a new version with security fixes in early 2021. Organizations should update to the latest version of Yealink Device Management platform when available. As temporary mitigations, organizations should ensure the affected systems are not directly accessible from the internet and implement strong network segmentation controls (SSD Advisory).

Additional resources


SourceThis report was generated using AI

Related Yealink Device Management vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2021-27561CRITICAL9.8
  • Yealink Device ManagementYealink Device Management
  • cpe:2.3:a:yealink:device_management
YesNoOct 15, 2021

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management