CVE-2022-2199

7.5 HIGH

📋 TL;DR

This vulnerability is a reflected cross-site scripting (XSS) flaw in the MiCODUS MV720 GPS tracker web server, allowing an attacker to inject malicious scripts via crafted requests. If exploited, it could enable remote code execution or data theft by tricking users into clicking malicious links. Affected users include those operating the MiCODUS MV720 GPS tracker with vulnerable firmware.

💻 Affected Systems

Products:
  • MiCODUS MV720 GPS tracker
Versions: All versions prior to the patched firmware (specific version not specified in references)
Operating Systems: Embedded firmware, no specific OS listed
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the default web server configuration of the GPS tracker, with no special settings required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full control over the GPS tracker, potentially manipulating tracking data, disabling the device, or using it as a foothold for further network attacks.

🟠

Likely Case

Attackers steal session cookies or credentials, leading to unauthorized access to the GPS tracker's web interface and possible data exfiltration.

🟢

If Mitigated

With input validation and output encoding, the risk is reduced to minimal, preventing script execution and limiting impact to minor disruptions.

🌐 Internet-Facing: HIGH, as the web server is typically exposed to the internet for remote management, making it easily accessible to attackers.
🏢 Internal Only: MEDIUM, as internal users could still be tricked via phishing, but network segmentation might reduce exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (e.g., clicking a malicious link), but no authentication is needed, making it straightforward for attackers with social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not explicitly stated in references; check vendor for latest firmware update.

Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01

Restart Required: Yes

Instructions:

1. Contact MiCODUS or check their website for firmware updates. 2. Download the latest firmware version. 3. Apply the update via the device's web interface or management tool. 4. Restart the GPS tracker to ensure changes take effect.

🔧 Temporary Workarounds

Implement Web Application Firewall (WAF)

all

Deploy a WAF to filter malicious requests and block XSS payloads before they reach the GPS tracker.

Disable Remote Web Access

all

Limit access to the GPS tracker's web server to internal networks only, reducing exposure to internet-based attacks.

🧯 If You Can't Patch

  • Isolate the GPS tracker on a segmented network to minimize lateral movement risk.
  • Educate users to avoid clicking suspicious links and implement strict input validation proxies.

🔍 How to Verify

Check if Vulnerable:

Test by injecting a simple script payload (e.g., <script>alert('test')</script>) into web server parameters and check if it executes in the browser.

Check Version:

Log into the GPS tracker's web interface and navigate to the system or firmware info page to check the current version.

Verify Fix Applied:

After patching, repeat the XSS test; if the script is sanitized or blocked, the fix is effective.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests with script tags or encoded payloads in query parameters
  • Multiple failed login attempts or access from suspicious IPs

Network Indicators:

  • Traffic patterns showing repeated requests to the GPS tracker's web server with malicious strings
  • Outbound connections to unknown domains after exploitation

SIEM Query:

source="gps_tracker_logs" AND (http_uri CONTAINS "<script>" OR http_uri CONTAINS "javascript:")

🔗 References

📤 Share & Export