Article Details
Scrape Timestamp (UTC): 2023-12-18 20:53:11.249
Original Article Text
Click to Toggle View
Microsoft discovers critical RCE flaw in Perforce Helix Core Server. Four vulnerabilities, one of which is rated critical, have been discovered in the Perforce Helix Core Server, a source code management platform widely used by the gaming, government, military, and technology sectors. Microsoft analysts discovered the flaws during a security review of the product, which the company's game development studios use, and responsibly reported them to Perforce in late August 2023. Although Microsoft says it has not observed any exploitation attempts of the discovered vulnerabilities in the wild, users of the product are recommended to upgrade to version 2023.1/2513900, released on November 7, 2023, to mitigate the risk. The Perforce Helix Core vulnerabilities The four flaws discovered by Microsoft mainly involve denial of service (DoS) issues, with the most severe allowing arbitrary remote code execution as LocalSystem by unauthenticated attackers. The vulnerabilities are summarized as follows: The most dangerous flaw of the set, CVE-2023-45849, allows unauthenticated attackers to execute code from 'LocalSystem,' a high-privileged Windows OS account reserved for system functions. This account level can access local resources and system files, modify registry settings, and more. The vulnerability arises from the server's mishandling of the user-bgtask RPC command. In its default configuration, Perforce Server permits unauthenticated attackers to remotely execute arbitrary commands, including PowerShell scripts, as LocalSystem. By leveraging CVE-2023-45849, attackers may install backdoors, access sensitive information, create or modify system settings, and potentially take complete control of the system running a vulnerable version of Perforce Server. The remaining three vulnerabilities are less severe, allowing denial of service attacks, but can still cause operational disruption that could translate to significant financial losses in large-scale deployments. Protection recommendations Apart from downloading the latest version of Helix Core from the vendor's download portal, Microsoft proposes taking the following steps: It is also recommended to follow the tips provided in this official security guide.
Daily Brief Summary
Microsoft identified a critical remote code execution flaw, CVE-2023-45849, in Perforce Helix Core Server, risking privileged access by unauthenticated attackers.
Four vulnerabilities were reported in total, with three causing potential denial of service disruptions.
Perforce Helix Core Server is widely used in industries like gaming, government, military, and technology, amplifying the potential impact of exploitation.
Microsoft, a user of the Perforce platform for game development, conducted a security review and reported the issues to Perforce responsibly.
There have been no known exploitation attempts in the wild, but upgrading to the patched version 2023.1/2513900 is strongly advised to mitigate risks.
Microsoft recommends additional protective measures, including following Perforce's official security guidelines, to secure systems against these vulnerabilities.