CVE-2017-20203
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-09

Last updated on: 2025-10-14

Assigner: VulnCheck

Description
NetSarang Xmanager Enterprise 5.0 Build 1232, Xmanager 5.0 Build 1045, Xshell 5.0 Build 1322, Xftp 5.0 Build 1218, and Xlpd 5.0 Build 1220 contain a malicious nssock2.dll that implements a multi-stage, DNS-based backdoor. The dormant library contacts a C2 DNS server via a specially crafted TXT record for a month‑generated domain. After receiving a decryption key, it then downloads and executes arbitrary code, creates an encrypted virtual file system (VFS) in the registry, and grants the attacker full remote code execution, data exfiltration, and persistence. NetSarang released builds for each product line that remediated the compromise: Xmanager Enterprise Build 1236, Xmanager Build 1049, Xshell Build 1326, Xftp Build 1222, and Xlpd Build 1224. Kaspersky Lab identified an instance of exploitation in the wild in August 2017.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-09
Last Modified
2025-10-14
Generated
2026-05-07
AI Q&A
2025-10-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
netsarang xlpd 5.0
netsarang xmanager_enterprise 5.0
netsarang xshell 5.0
netsarang xmanager 5.0
netsarang xftp 5.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-506 The product contains code that appears to be malicious in nature.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves a malicious nssock2.dll in certain NetSarang products that acts as a multi-stage, DNS-based backdoor. The dormant DLL contacts a command and control (C2) DNS server using specially crafted TXT records for a domain generated monthly. After receiving a decryption key, it downloads and executes arbitrary code, creates an encrypted virtual file system in the registry, and allows the attacker full remote code execution, data exfiltration, and persistence on the affected system.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to remotely execute arbitrary code on the affected system, exfiltrate data, and maintain persistent access. This means an attacker could take full control of the system, steal sensitive information, and remain undetected for extended periods.


What immediate steps should I take to mitigate this vulnerability?

Update the affected NetSarang products to the fixed builds released by NetSarang: Xmanager Enterprise to Build 1236, Xmanager to Build 1049, Xshell to Build 1326, Xftp to Build 1222, and Xlpd to Build 1224. These updates remediate the malicious nssock2.dll backdoor.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart