We are writing to inform you of recently discovered issues related to the RBAC feature and device groups in the Mender Server. The issues were fixed in Mender Server 3.7.11 and 4.0.1 - earlier versions are affected. If you haven't already upgraded to the latest version, we recommend upgrading to Mender Server version 4.0.1 or later. (Mender Server 3.7.x is no longer supported). We have no indications of these issues being exploited or known outside of the company and the security researcher who reported it; Thank you to Raviraj for discovering and responsibly disclosing these weaknesses.
If you are using the RBAC system and device groups to give different people access to different devices and groups, there were cases where the users would have access to more than intended. Specifically, depending on how it was set up, granting a user (role) access to some specific devices (through specific static device groups), could lead to them having more access than intended, through the API:
These issues have been fixed in the latest, recently released versions of the Mender Server.
An attacker with access to a compromised user / session, would have access to more devices and actions than necessary and intended. In the worst case, they would gain access to deploying updates and deleting groups where that user should not have those permissions.
There are some factors to consider:
If you have already upgraded to Mender Server 3.7.11, 4.0.1, or later, you do not have to do anything. Additionally, if you are using hosted Mender, we've already patched this vulnerability for you. The Mender Server version can be found in the Mender UI, bottom left corner. (It is also mentioned at the top of your Helm chart, in the appVersion
field).
If you are on one of the affected versions, we recommend upgrading, following our upgrade instructions in the documentation:
https://docs.mender.io/server-installation/upgrading-from-previous-versions
Aside from upgrading, there are some general best practices which can help mitigate risks like these;
For help with upgrading or additional questions, please contact support at: