SolusVM is a popular virtualization management solution used by many VPS providers. It’s a familiar control panel for end users, who use it to setup their VPSes. Most providers offer templates, which are pre-configured Linux systems based on the most common distros – CentOS, Debian, Ubuntu, Arch, etc.
These templates are provided by SolusVM. Unfortunately, one of the most popular template (Debian 10) has been found to have a serious security vulnerability. If you setup your VPS using the Debian 10 template, you need to take action.
What’s the Issue?
The SolusVM-provided Debian 10 template contains a user called “debianuser”. This user may still exist after setup, in which an outsider could potentially access your VM.
Am I Vulnerable?
You may be if both these things are true:
- You installed Debian 10
- You installed it from a SolusVM-provided template
Contact your provider and ask about your situation. Several prominent providers have already sent out warning emails.
Any Other Details?
It appears that a hacker would need to authenticate as debianuser using a password. If you have disabled password authentication (i.e., you’re only allowing ssh key authentication) you should be safe. But it’s something you would have had to do very soon after install, otherwise you don’t know what happened before you made that change.
How Do I Fix This?
Unfortunately, the only way to truly fix it is to reinstall your VPS.
I Installed Debian 10 From ISO – Am I Vulnerable?
No.
What Are Signs of Compromise?
This vulnerability has been associated with the CrytoNight miner. If you see a process called ‘cnrig’ on your system, you have definitely been compromised. However, it’s worth pointing out that a sophisticated hacker could replace the tools you use (ps, grep, etc.) to see if that process is running with compromised versions that don’t allow you to see it.
You can also see if the debianuser user account exists:
# grep debianuser /etc/passwd debianuser:x:1000:1000:DebianUser,,,:/home/debianuser:/bin/bash
I’m Too Busy Getting Ready to Play in the SuperBowl to Reinstall Right Now – Anything I Can in the Meantime?
You can delete the debianuser account (userdel debianuser) and turn off password authentication (start here). Also, if you see any process called ‘cnrig’ you should kill it.
But to emphasize: once a hacker’s been on your box, you have no way of knowing what he’s done or what the state of your system is.
Can’t I Just Install a Patch?
Unlike a software vulnerability, this is more of an administrative vulnerability. There is nothing wrong with the software on your system. SolusVM just forgot to delete an account. This can’t be patched away.
Your provider should replace their template, but that will only help future installs.
How Long Has This Exploit Been in the Wild?
At least since October 2020, if not earlier.
Where Can I Learn More?
You can read the relevant thread on LowEndTalk
Related Posts:
"OMG! I Never Knew That!": The Simply Linux Tip That Has Got Me More Thanks Than Anything I've Ever ...
Need a Laugh? Read the Linux Kernel List's Foam-Mouthed Responses to Russian Programmers Banned from...
LowEndBoxTV: Ubuntu 24: Hot Rod Ferrari Speed Freak, Crippled Dump Truck, or Somewhere in Between?
Nontechnical Nonsense: Rust Stirs Up a Storm of Drama in the Linux Kernel: Ted T'so Shouting, Mainta...
RedHat Prepares to Give Bootloaders the Boot
The Mother of All Supply Chain Attacks! Is 1Password Safe?!? (UPDATED)
- AI Pushes the Doomsday Clock a Second Closer to Midnight - January 29, 2025
- QuadraNet’s LA Datacenter Has Been Offline for Five Days - January 28, 2025
- Vote For Your Favorite Provider and Win Prizes!Provider Poll 2024 is Open! - January 28, 2025
Leave a Reply