Cloud Defense Logo

Products

Solutions

Company

CVE-2022-36120 : What You Need to Know

Discover how CVE-2022-36120 in Blue Prism Enterprise 6.0 through 7.01 allows authenticated users to execute MSSQL stored procedures, leading to potential security risks and unauthorized actions on servers.

An issue was discovered in Blue Prism Enterprise 6.0 through 7.01 that allows an authenticated user to exploit the getChartData function to execute arbitrary MSSQL stored procedures. This vulnerability enables the attacker to modify server settings using a low privilege account.

Understanding CVE-2022-36120

This CVE refers to a security flaw in Blue Prism Enterprise versions 6.0 through 7.01 that can be exploited by authenticated users to bypass access controls and execute unauthorized actions using the getChartData function.

What is CVE-2022-36120?

The vulnerability in Blue Prism Enterprise allows an attacker with limited privileges to manipulate server settings and run MSSQL stored procedures by leveraging the getChartData method, potentially leading to unauthorized access and control.

The Impact of CVE-2022-36120

The exploitation of this vulnerability could result in unauthorized access to sensitive data, manipulation of server configurations, and potential disruption of critical business operations.

Technical Details of CVE-2022-36120

This section provides further technical insights into the vulnerability.

Vulnerability Description

In a misconfigured environment, an authenticated user can abuse the getChartData function to execute any MSSQL stored procedure, enabling unauthorized access to the Blue Prism server.

Affected Systems and Versions

Blue Prism Enterprise versions 6.0 through 7.01 are affected by this vulnerability, potentially exposing organizations to security risks if not patched promptly.

Exploitation Mechanism

By leveraging a low-privilege Blue Prism user account, an attacker can manipulate the getChartData method to execute MSSQL stored procedures and modify server configurations.

Mitigation and Prevention

To safeguard systems from CVE-2022-36120, immediate actions should be taken, and long-term security practices must be enforced to prevent similar exploits in the future.

Immediate Steps to Take

Organizations should apply security patches provided by Blue Prism promptly, restrict access to vulnerable servers, and monitor for any suspicious activities on the network.

Long-Term Security Practices

Implementing the principle of least privilege, conducting regular security assessments, and educating users on safe computing practices can enhance overall security posture.

Patching and Updates

Regularly update and patch Blue Prism Enterprise to the latest version to ensure that known vulnerabilities, including CVE-2022-36120, are addressed effectively.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now