CVE-2023-27573
NetBox · netbox-docker
NetBox-docker versions before 2.5.0 contain a superuser account with default credentials and a static API token, potentially allowing unauthorized administrative access.
Executive summary
The use of default administrative credentials and a static API token in netbox-docker poses a critical risk of unauthorized access and data exposure.
Vulnerability
This issue stems from the inclusion of a default superuser account (admin/admin) and a hard-coded SUPERUSER_API_TOKEN. While intended for development, many production deployments failed to change these values, leaving them vulnerable to unauthenticated attackers who can access the instance over the network.
Business impact
A successful exploit allows an attacker to gain full control over the NetBox instance, which typically contains sensitive network infrastructure data, IP addresses, and device configurations. The CVSS score of 9.0 reflects the high potential for data exfiltration and the compromise of critical network documentation, which could facilitate further attacks on the organization.
Remediation
Immediate Action: Update netbox-docker to version 2.5.0 or later and ensure that all default passwords and API tokens are changed to unique, complex values.
Proactive Monitoring: Review NetBox access logs and API usage records for any activity associated with the default "admin" account or the known static token.
Compensating Controls: Implement network segmentation to ensure the NetBox instance is only accessible from trusted management networks and not the public internet.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The reliance on default credentials in a production environment is a critical security failure. Administrators must immediately verify their NetBox configurations, rotate all secrets, and update to the latest version. Given the sensitivity of the data stored in NetBox, this remediation should be completed within the current maintenance cycle to prevent unauthorized infrastructure mapping.