Privilege Escalation via DB Ports

Attack

Replication needs a super-admin password and an open DB port.

Open port for super admin

With SQL Replication

The attacker steals the sysadmin-level replication account via an open port 5022 and pivots into other databases.

Hacker Exploits Open Port

With RMF's Object Synchronization

The sync connector only makes an outbound secure call with a short-lived, narrow-scope token through the XProtect API/SDK (provided certificates are enabled on XProtect). Even if stolen, the damage is limited, and no DB port is open.

Scoped TLS port on the API, not DB

Last updated