Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-24393 : Security Advisory and Response

Learn about CVE-2022-24393, an authenticated command injection vulnerability in Fidelis Network and Deception CommandPost prior to version 9.4.5. Find out the impact, affected systems, and mitigation steps.

Fidelis Network and Deception CommandPost are affected by an authenticated command injection vulnerability that allows executing system commands through the web interface, prior to version 9.4.5.

Understanding CVE-2022-24393

This CVE identifies a critical vulnerability in Fidelis Network and Deception products that could lead to unauthorized command execution through specially crafted HTTP requests.

What is CVE-2022-24393?

The CVE-2022-24393 vulnerability in Fidelis Network and Deception CommandPost enables authenticated command injection via the web interface using a specific parameter, potentially allowing attackers to execute commands on affected systems.

The Impact of CVE-2022-24393

The vulnerability poses a high risk with a CVSS base score of 8.8, allowing attackers to achieve root-level access and execute arbitrary commands on the CommandPost.

Technical Details of CVE-2022-24393

The following technical details outline the specific aspects of the CVE:

Vulnerability Description

The vulnerability allows authenticated users to perform command injection by manipulating the 'cpIp' parameter in the web interface, leading to unauthorized command execution.

Affected Systems and Versions

Fidelis Network and Deception versions prior to 9.4.5 are vulnerable to this exploit, impacting CentOS platforms.

Exploitation Mechanism

Exploitation involves sending a specially crafted HTTP request with the 'check_vertica_upgrade' value for the 'cpIp' parameter, enabling attackers to execute system commands and retrieve the results.

Mitigation and Prevention

To address CVE-2022-24393, users and organizations can take the following steps:

Immediate Steps to Take

Apply patches or upgrade affected Fidelis Network and Deception installations to version 9.4.5 or higher to mitigate the vulnerability.

Long-Term Security Practices

Regularly update software and implement security best practices to prevent similar vulnerabilities in the future.

Patching and Updates

Fidelis Cybersecurity has released patches and updates to address the vulnerability, ensuring system integrity and security.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now