Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-10068 : Security Advisory and Response

Discover the security vulnerability in Kentico versions 9.x to 12.0.x allowing unauthenticated remote code execution. Learn how to mitigate CVE-2019-10068.

A vulnerability has been identified in versions 9.x, 10.0.x, 11.0.x, and 12.0.x of Kentico, allowing unauthenticated remote code execution.

Understanding CVE-2019-10068

This CVE pertains to a security vulnerability in Kentico versions prior to 12.0.15, 11.0.48, and 10.0.52, enabling attackers to execute code remotely.

What is CVE-2019-10068?

The vulnerability in Kentico arises from inadequate validation on security headers, enabling attackers to bypass initial authentication and execute code remotely.

The Impact of CVE-2019-10068

Exploiting this vulnerability allows attackers to gain the ability to deserialize user-controlled .NET object input, leading to unauthenticated remote code execution on the server hosting the Kentico instance.

Technical Details of CVE-2019-10068

This section provides more in-depth technical insights into the CVE.

Vulnerability Description

The vulnerability in Kentico versions prior to 12.0.15, 11.0.48, and 10.0.52 stems from a lack of validation on security headers, facilitating unauthenticated remote code execution.

Affected Systems and Versions

        Kentico versions 9.x, 10.0.x, 11.0.x, and 12.0.x
        Versions prior to 12.0.15, 11.0.48, and 10.0.52

Exploitation Mechanism

Attackers can exploit this vulnerability by making a specially crafted request to the staging service, bypassing initial authentication and gaining the ability to execute code remotely.

Mitigation and Prevention

Protecting systems from CVE-2019-10068 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Update Kentico to versions 12.0.15, 11.0.48, or 10.0.52 or later to mitigate the vulnerability.
        Monitor and restrict network access to the Kentico instance to prevent unauthorized access.

Long-Term Security Practices

        Implement strong input validation mechanisms to prevent malicious input from being processed.
        Regularly monitor and apply security patches and updates to the Kentico CMS.

Patching and Updates

        Apply the latest security patches provided by Kentico to address the vulnerability and enhance system security.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now