CVE-2022-1360

8.2 HIGH

📋 TL;DR

CVE-2022-1360 is an OS command injection vulnerability in Cambium Networks cnMaestro On-Premise that allows remote attackers to execute arbitrary commands on the server. This affects organizations running vulnerable versions of cnMaestro On-Premise, potentially allowing attackers to change server configurations or gain full control.

💻 Affected Systems

Products:
  • Cambium Networks cnMaestro On-Premise
Versions: Versions prior to 3.0.0
Operating Systems: Linux-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects On-Premise deployments, not cloud-based cnMaestro instances.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the cnMaestro server leading to network-wide disruption, data theft, and lateral movement to other network devices.

🟠

Likely Case

Unauthorized configuration changes, service disruption, and potential installation of backdoors or malware.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting the cnMaestro instance itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the cnMaestro instance but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.0.0 and later

Vendor Advisory: https://www.cambiumnetworks.com/support/cve-2022-1360/

Restart Required: Yes

Instructions:

1. Download cnMaestro On-Premise version 3.0.0 or later from Cambium support portal. 2. Backup current configuration. 3. Install the update following Cambium's upgrade documentation. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to cnMaestro management interface to trusted IP addresses only.

Use firewall rules to limit access to cnMaestro ports (typically 443/HTTPS) to authorized management networks only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate cnMaestro from critical network segments
  • Monitor cnMaestro logs for unusual command execution or configuration changes

🔍 How to Verify

Check if Vulnerable:

Check cnMaestro version via web interface (Admin > System > About) or SSH to appliance and check version.

Check Version:

ssh admin@cnmaestro-ip 'cat /etc/cnmaestro/version' or check web interface at Admin > System > About

Verify Fix Applied:

Confirm version is 3.0.0 or later in the web interface or via command line.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Unexpected configuration changes
  • Failed authentication attempts followed by successful access

Network Indicators:

  • Unusual outbound connections from cnMaestro server
  • Traffic to unexpected ports from cnMaestro

SIEM Query:

source="cnmaestro" AND (event_type="command_execution" OR event_type="config_change")

🔗 References

📤 Share & Export