CVE-2022-21828

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated users with high privilege access to the Incapptic Connect web console to remotely execute arbitrary code on the server. It affects Incapptic Connect versions 1.35.3 through 1.40.0, potentially enabling attackers to gain full control of the server.

💻 Affected Systems

Products:
  • Incapptic Connect
Versions: 1.35.3, 1.35.4, 1.35.5, 1.36.0, 1.37.0, 1.37.1, 1.38.0, 1.38.1, 1.39.0, 1.39.1, 1.40.0
Operating Systems: All platforms running Incapptic Connect
Default Config Vulnerable: ⚠️ Yes
Notes: Requires high privilege access to the web console. The vulnerability is present in default configurations of affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Incapptic Connect server, allowing attackers to execute arbitrary commands, steal sensitive data, deploy malware, or pivot to other systems in the network.

🟠

Likely Case

Privileged insiders or attackers who have compromised high-privilege accounts can execute arbitrary code on the server, potentially gaining persistent access and compromising the entire Incapptic Connect deployment.

🟢

If Mitigated

With proper access controls limiting high-privilege accounts and network segmentation, impact is limited to the Incapptic Connect server only, preventing lateral movement.

🌐 Internet-Facing: HIGH if the web console is exposed to the internet, as attackers could exploit this after compromising privileged credentials.
🏢 Internal Only: HIGH due to the potential for insider threats or attackers who have already gained privileged access through other means.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires high privilege credentials but the attack vector is unspecified in public disclosures. The CWE-502 (Deserialization of Untrusted Data) suggests potential for relatively straightforward exploitation once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.40.1 or later

Vendor Advisory: https://forums.ivanti.com/s/article/SA-2022-02-23?language=en_US

Restart Required: Yes

Instructions:

1. Download Incapptic Connect version 1.40.1 or later from the official Ivanti portal. 2. Backup current configuration and data. 3. Stop the Incapptic Connect service. 4. Install the updated version. 5. Restart the service. 6. Verify functionality.

🔧 Temporary Workarounds

Restrict Privileged Access

all

Limit high privilege access to the web console to only essential personnel and implement multi-factor authentication.

Network Segmentation

all

Isolate Incapptic Connect servers from critical systems and restrict inbound access to the web console.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all privileged user activity on the Incapptic Connect web console.
  • Deploy network-based intrusion detection systems to monitor for suspicious activity and potential exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check the Incapptic Connect version via the web console admin interface or configuration files. If version is between 1.35.3 and 1.40.0 inclusive, the system is vulnerable.

Check Version:

Check the web console admin dashboard or examine the application configuration files for version information.

Verify Fix Applied:

After patching, verify the version shows 1.40.1 or later in the web console admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privileged user activity in web console logs
  • Suspicious command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful privileged login

Network Indicators:

  • Unusual outbound connections from the Incapptic Connect server
  • Suspicious payloads in web console traffic

SIEM Query:

source="incapptic-connect" AND (event_type="admin_login" OR event_type="command_execution") | stats count by user, src_ip

🔗 References

📤 Share & Export