Learn about CVE-2022-24393, an authenticated command injection vulnerability in Fidelis Network and Deception CommandPost prior to version 9.4.5. Find out the impact, affected systems, and mitigation steps.
Fidelis Network and Deception CommandPost are affected by an authenticated command injection vulnerability that allows executing system commands through the web interface, prior to version 9.4.5.
Understanding CVE-2022-24393
This CVE identifies a critical vulnerability in Fidelis Network and Deception products that could lead to unauthorized command execution through specially crafted HTTP requests.
What is CVE-2022-24393?
The CVE-2022-24393 vulnerability in Fidelis Network and Deception CommandPost enables authenticated command injection via the web interface using a specific parameter, potentially allowing attackers to execute commands on affected systems.
The Impact of CVE-2022-24393
The vulnerability poses a high risk with a CVSS base score of 8.8, allowing attackers to achieve root-level access and execute arbitrary commands on the CommandPost.
Technical Details of CVE-2022-24393
The following technical details outline the specific aspects of the CVE:
Vulnerability Description
The vulnerability allows authenticated users to perform command injection by manipulating the 'cpIp' parameter in the web interface, leading to unauthorized command execution.
Affected Systems and Versions
Fidelis Network and Deception versions prior to 9.4.5 are vulnerable to this exploit, impacting CentOS platforms.
Exploitation Mechanism
Exploitation involves sending a specially crafted HTTP request with the 'check_vertica_upgrade' value for the 'cpIp' parameter, enabling attackers to execute system commands and retrieve the results.
Mitigation and Prevention
To address CVE-2022-24393, users and organizations can take the following steps:
Immediate Steps to Take
Apply patches or upgrade affected Fidelis Network and Deception installations to version 9.4.5 or higher to mitigate the vulnerability.
Long-Term Security Practices
Regularly update software and implement security best practices to prevent similar vulnerabilities in the future.
Patching and Updates
Fidelis Cybersecurity has released patches and updates to address the vulnerability, ensuring system integrity and security.