CVE-2022-21952

7.5 HIGH

📋 TL;DR

CVE-2022-21952 is a missing authentication vulnerability in SUSE Manager Server's spacewalk-java component that allows remote attackers to trigger disk exhaustion attacks without authentication. This leads to denial of service by consuming all available disk resources. Affected systems include SUSE Manager Server 4.1 and 4.2 with vulnerable spacewalk-java versions.

💻 Affected Systems

Products:
  • SUSE Manager Server
  • spacewalk-java
Versions: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46, SUSE Manager Server 4.2 spacewalk-java versions prior to 4.2.37
Operating Systems: SUSE Linux Enterprise Server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of SUSE Manager Server where the vulnerable spacewalk-java component is exposed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to disk exhaustion, preventing legitimate operations and potentially requiring manual intervention to restore service.

🟠

Likely Case

Service disruption and performance degradation as disk space fills, impacting SUSE Manager functionality and dependent systems.

🟢

If Mitigated

Minimal impact with proper authentication controls and disk monitoring in place.

🌐 Internet-Facing: HIGH - Remote unauthenticated attackers can exploit this vulnerability from anywhere on the internet.
🏢 Internal Only: HIGH - Even internally, the lack of authentication allows any network-accessible attacker to trigger the DoS condition.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and the attack vector is straightforward - triggering resource exhaustion through repeated requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: spacewalk-java 4.1.46 for SUSE Manager Server 4.1, spacewalk-java 4.2.37 for SUSE Manager Server 4.2

Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=1199512

Restart Required: Yes

Instructions:

1. Update SUSE Manager Server using 'zypper update spacewalk-java'. 2. Restart the spacewalk-java service. 3. Verify the patch is applied by checking the version.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to SUSE Manager Server to trusted IP addresses only

iptables -A INPUT -p tcp --dport [SUSE_MANAGER_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [SUSE_MANAGER_PORT] -j DROP

Disk Monitoring and Alerting

linux

Implement aggressive disk space monitoring with immediate alerts

df -h /var
monit alert disk_space when space usage > 80% for 5 cycles

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to SUSE Manager Server
  • Deploy disk usage monitoring with automated cleanup scripts for temporary files

🔍 How to Verify

Check if Vulnerable:

Check spacewalk-java version: rpm -q spacewalk-java

Check Version:

rpm -q spacewalk-java --queryformat '%{VERSION}-%{RELEASE}\n'

Verify Fix Applied:

Verify version is 4.1.46 or higher for SUSE Manager 4.1, or 4.2.37 or higher for SUSE Manager 4.2

📡 Detection & Monitoring

Log Indicators:

  • Rapid disk space consumption alerts
  • Unusual high-volume requests to spacewalk-java endpoints
  • System logs showing disk full errors

Network Indicators:

  • Unusual traffic patterns to SUSE Manager Server from untrusted sources
  • Repeated requests to disk-intensive endpoints

SIEM Query:

source="syslog" AND ("disk full" OR "No space left on device") AND host="*susemanager*"

🔗 References

📤 Share & Export