CVE-2022-0365

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary operating system commands with root/admin privileges on affected systems. It affects specific industrial control system products that have vulnerable configurations. Attackers with valid credentials can gain complete system control.

💻 Affected Systems

Products:
  • Specific industrial control system products (check vendor advisory for exact list)
Versions: Multiple versions prior to vendor patch (exact range in vendor advisory)
Operating Systems: Linux-based embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access but default credentials may be present in some deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands as root, potentially leading to data theft, system destruction, or lateral movement across networks.

🟠

Likely Case

Attackers with valid credentials gain full administrative control over affected systems, enabling them to modify configurations, steal sensitive data, or disrupt operations.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated systems with minimal critical data exposure.

🌐 Internet-Facing: HIGH if exposed to internet with default or weak credentials, as authenticated access is required but credentials may be guessable or default.
🏢 Internal Only: HIGH as authenticated internal users or compromised accounts can exploit this to gain root privileges and pivot to other systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but command injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-22-032-01

Restart Required: Yes

Instructions:

1. Review vendor advisory for affected products. 2. Download and apply vendor-provided patches. 3. Restart affected systems. 4. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from untrusted networks and limit access to authorized users only.

Credential Hardening

all

Change default credentials, enforce strong password policies, and implement multi-factor authentication where possible.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with vulnerable devices
  • Monitor for unusual command execution patterns and authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check system version against vendor advisory and review if command injection vulnerabilities exist in web interfaces or APIs.

Check Version:

Check vendor documentation for version query commands specific to affected products.

Verify Fix Applied:

Verify patch version is installed and test that command injection attempts are properly sanitized or blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Multiple failed authentication attempts followed by successful login
  • Suspicious shell commands in application logs

Network Indicators:

  • Unexpected outbound connections from industrial control systems
  • Traffic patterns indicating command and control activity

SIEM Query:

source="application_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export