Defective security patch for HCL BigFix Server Automation repaired

Attackers can take down HCL BigFix via a DoS attack. A revised security update should now solve the problem.

listen Print view
Burning laptop in front of servers that monitor the laptop

(Image: Bild erstellt mit KI in Bing Image Creator durch heise online / dmk)

1 min. read

Because a security patch is faulty, the server automation software HCL BigFix Server Automation is still vulnerable. The developers have now responded.

Admins use the application to automate tasks on servers, for example to install updates in certain sequences.

In a warning message, they write that the vulnerability (CVE-2024-52798"high") is due to a broken security update for a vulnerability (CVE-2024-45296 "high") from November 2024 in the same context. According to HCL, attackers can target outputs of the path-to-regexp function to impact performance and provoke DoS states. So far, there is no evidence of ongoing attacks.

Videos by heise

All versions up to and including 9.5.70 are affected. HCL BigFix SA REST API 9.5.71 is the version secured against the described attack. Admins can find installation instructions in the warning message.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.