Learn about CVE-2022-24082, a critical vulnerability in Pega Infinity that allows attackers to upload serialized payloads to compromise systems. Find mitigation steps & security practices.
This article provides detailed information on CVE-2022-24082, a critical vulnerability affecting Pega Infinity installations.
Understanding CVE-2022-24082
CVE-2022-24082 is a vulnerability that allows attackers to upload serialized payloads to attack Pega Platform installations through the JMX interface.
What is CVE-2022-24082?
If an on-premise installation of Pega Platform has the JMX interface port exposed to the Internet without proper port filtering, it becomes vulnerable to this attack. PegaCloud installations are not affected due to their design.
The Impact of CVE-2022-24082
This vulnerability can be exploited by attackers to compromise the underlying system, leading to unauthorized access, data manipulation, and service disruptions with a high impact on confidentiality, integrity, and availability.
Technical Details of CVE-2022-24082
Vulnerability Description
The vulnerability arises from improper configuration of port filtering in on-premise Pega Platform installations, allowing attackers to upload malicious serialized payloads.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability by uploading serialized payloads through the exposed JMX interface, leading to remote code execution.
Mitigation and Prevention
Immediate Steps to Take
Pega Platform users are advised to ensure that the JMX interface port is not exposed to the Internet and implement proper port filtering to prevent unauthorized access.
Long-Term Security Practices
Regular security assessments, updates, and monitoring of network configurations are recommended to mitigate the risk of similar vulnerabilities.
Patching and Updates
Users should apply the necessary security patches provided by Pegasystems to address CVE-2022-24082 and enhance the security of their Pega Platform installations.