CVE-2020-37085

VirtualTablet · VirtualTablet Server

VirtualTablet Server 3 contains a security vulnerability that could be exploited to perform unauthorized actions on the host system. This affects the server component responsible for receiving input from remote devices.

Executive summary

A high-severity vulnerability in VirtualTablet Server 3 could allow an attacker to compromise the host system by exploiting the communication channel between the server and remote tablet devices.

Vulnerability

This vulnerability affects the VirtualTablet Server 3 application. Given its function as a network-based input server, the flaw likely involves improper validation of data received from unauthenticated remote clients, potentially leading to unauthorized command execution or service disruption.

Business impact

A successful exploit could allow an attacker to gain control over the host machine or disrupt the input services required for creative work. The CVSS score of 7.5 reflects a High severity risk, particularly in environments where these servers are exposed to the network, potentially leading to broader lateral movement within the organization.

Remediation

Immediate Action: Update VirtualTablet Server to the latest version immediately. If the software is no longer supported, consider migrating to a secure alternative.

Proactive Monitoring: Monitor for unexpected network traffic on the ports used by VirtualTablet Server and check for unauthorized processes running with the server's privileges.

Compensating Controls: Use a host-based firewall to restrict access to the VirtualTablet Server port to only known, authorized client IP addresses.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations using VirtualTablet Server 3 should treat this as a high-priority patch. The potential for unauthorized network-based access to a host system via an input driver is a significant security risk that must be addressed through immediate updates and network isolation.