CVE-2022-22127

7.2 HIGH

📋 TL;DR

This vulnerability allows a malicious Tableau Server site administrator to change passwords for users in different sites hosted on the same server when using Local Identity Store. This could lead to unauthorized access to sensitive data. Only Tableau Server customers using Local Identity Store for user management are affected.

💻 Affected Systems

Products:
  • Tableau Server
Versions: 2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 and earlier
Operating Systems: All supported Tableau Server operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations using Local Identity Store for user management. Tableau Server versions that are no longer supported may also be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A compromised site administrator could reset passwords for all users across all sites, gaining unauthorized access to sensitive business intelligence data and potentially exfiltrating or manipulating critical information.

🟠

Likely Case

A malicious insider with site administrator privileges could access data from other sites they shouldn't have access to, potentially exposing confidential business data or personal information.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to unauthorized password resets that can be detected and reversed before significant damage occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires site administrator privileges. The vulnerability involves broken access control within the Tableau Server administration interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4

Vendor Advisory: https://help.salesforce.com/s/articleView?id=000365493&type=1

Restart Required: Yes

Instructions:

1. Download the latest Tableau Server version from the official Tableau website. 2. Follow Tableau's upgrade documentation for your specific version. 3. Apply the update to all Tableau Server nodes. 4. Restart Tableau Server services.

🔧 Temporary Workarounds

Restrict Site Administrator Privileges

all

Limit the number of site administrators and implement strict access controls. Only grant site administrator privileges to trusted personnel who require access to all sites.

Implement External Identity Provider

all

Migrate from Local Identity Store to an external identity provider (like Active Directory, LDAP, or SAML) which may not be affected by this vulnerability.

🧯 If You Can't Patch

  • Implement strict monitoring of password reset activities in Tableau Server logs
  • Enforce least privilege access and regularly audit site administrator accounts

🔍 How to Verify

Check if Vulnerable:

Check Tableau Server version via Tableau Server Administration UI or command line. If using Local Identity Store and version is 2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 or earlier, you are vulnerable.

Check Version:

tabadmin version (Linux) or tableau-server-version (Windows)

Verify Fix Applied:

Verify Tableau Server version is updated beyond affected versions and test that site administrators cannot change passwords for users in other sites.

📡 Detection & Monitoring

Log Indicators:

  • Unusual password reset activities by site administrators
  • Password reset attempts for users in different sites
  • Failed login attempts followed by password resets

Network Indicators:

  • Unusual authentication patterns from site administrator accounts
  • Access to data from sites not normally accessed by the administrator

SIEM Query:

source="tableau_server" AND (event_type="password_reset" OR event_type="user_modified") AND target_user_site != admin_user_site

🔗 References

📤 Share & Export