Overview
CVE-2024-55210 is a critical vulnerability discovered in TOTVS Framework (Linha Protheus) version 12.1.2310. This vulnerability allows attackers to circumvent multi-factor authentication (MFA), a significant security feature designed to ensure an additional layer of authentication beyond the basic username and password. Given the high CVSS Severity Score of 9.8, the implications of this vulnerability are grave, potentially leading to system compromise or data leakage. Organizations using the affected TOTVS Framework need to understand the severity of this vulnerability, implement the necessary mitigation measures, and update their systems as promptly as possible.
Vulnerability Summary
CVE ID: CVE-2024-55210
Severity: Critical (9.8)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: System compromise or data leakage
Affected Products
No phone number, email, or personal info required.
Product | Affected Versions
TOTVS Framework (Linha Protheus) | 12.1.2310
How the Exploit Works
The vulnerability resides in the websocket message handling of the TOTVS Framework. An attacker can craft a specific websocket message that, when processed by the affected system, can bypass the multi-factor authentication. This allows the attacker to gain unauthorized access to the system, potentially compromising the system or leaking sensitive data.
Conceptual Example Code
The following is a conceptual example of how the vulnerability might be exploited. This is a sample websocket message that contains a malicious payload:
GET /websocket/endpoint HTTP/1.1
Host: target.example.com
Upgrade: websocket
Connection: Upgrade
Sec-WebSocket-Key: x3JJHMbDL1EzLkh9GBhXDw==
Sec-WebSocket-Version: 13
{ "malicious_payload": "..." }
In this example, the attacker sends a crafted GET request over a websocket connection, carrying a malicious payload that can exploit the vulnerability and bypass the multi-factor authentication.
Mitigation Guidance
The primary mitigation measure for this vulnerability is to apply the vendor patch. TOTVS has released a patch to fix this vulnerability, and users are urged to apply this patch immediately. For organizations that cannot apply the patch immediately, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can serve as a temporary mitigation measure. These systems can detect and block malicious websocket messages, thereby preventing the exploit.
However, these are only temporary solutions and cannot substitute for the permanent fix provided by the vendor patch. Therefore, all users should schedule to apply the vendor patch as soon as possible to secure their systems from this critical vulnerability.