CVE-2022-0730

9.8 CRITICAL

📋 TL;DR

CVE-2022-0730 is an authentication bypass vulnerability in Cacti that allows attackers to gain unauthorized access under specific LDAP configurations. The vulnerability affects Cacti systems using LDAP authentication with certain credential types. Organizations running vulnerable Cacti versions with LDAP authentication enabled are at risk.

💻 Affected Systems

Products:
  • Cacti
Versions: All versions before 1.2.22
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ✅ No
Notes: Only affects systems with LDAP authentication enabled. Systems using local authentication only are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, access sensitive monitoring data, and pivot to other systems in the network.

🟠

Likely Case

Unauthorized access to Cacti monitoring dashboards, exposure of network infrastructure data, and potential privilege escalation within the monitoring system.

🟢

If Mitigated

Limited to authentication bypass only if proper network segmentation and access controls prevent further exploitation.

🌐 Internet-Facing: HIGH - Internet-facing Cacti instances with LDAP authentication are directly exploitable without authentication.
🏢 Internal Only: HIGH - Internal systems remain vulnerable to authenticated attackers or those who gain initial access through other means.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of LDAP configuration and specific credential manipulation. Public proof-of-concept code exists in the GitHub issue.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.22 and later

Vendor Advisory: https://github.com/Cacti/cacti/issues/4562

Restart Required: Yes

Instructions:

1. Backup current Cacti installation and database. 2. Download Cacti 1.2.22 or later from official repository. 3. Follow upgrade instructions at https://docs.cacti.net/Upgrading. 4. Restart web server and Cacti services.

🔧 Temporary Workarounds

Disable LDAP Authentication

linux

Temporarily switch to local authentication only until patching is complete

Edit Cacti config.php and set $config['auth_method'] = 1
Restart web server

Network Access Control

linux

Restrict access to Cacti web interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Cacti from critical systems
  • Enable detailed logging and monitoring for authentication attempts and access patterns

🔍 How to Verify

Check if Vulnerable:

Check Cacti version and LDAP configuration. If version < 1.2.22 and LDAP authentication is enabled, system is vulnerable.

Check Version:

grep 'cacti_version' /usr/share/cacti/include/global.php | cut -d"'" -f2

Verify Fix Applied:

Verify Cacti version is 1.2.22 or later and test LDAP authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Failed LDAP authentication attempts followed by successful access
  • Authentication logs showing unusual credential patterns
  • Access from unexpected IP addresses to admin interfaces

Network Indicators:

  • Unusual HTTP POST requests to authentication endpoints
  • Traffic patterns indicating credential manipulation

SIEM Query:

source="cacti.log" ("authentication" AND "bypass") OR ("LDAP" AND "unexpected")

🔗 References

📤 Share & Export