CVE-2022-22951

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated high-privileged attackers with network access to the VMware Carbon Black App Control administration interface to execute arbitrary operating system commands on the server. It affects VMware Carbon Black App Control versions 8.5.x before 8.5.14, 8.6.x before 8.6.6, 8.7.x before 8.7.4, and 8.8.x before 8.8.2.

💻 Affected Systems

Products:
  • VMware Carbon Black App Control
Versions: 8.5.x prior to 8.5.14, 8.6.x prior to 8.6.6, 8.7.x prior to 8.7.4, 8.8.x prior to 8.8.2
Operating Systems: Windows Server, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated high-privileged access to the administration interface. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Carbon Black App Control server, allowing attackers to execute arbitrary commands with system privileges, potentially leading to lateral movement, data exfiltration, or deployment of ransomware.

🟠

Likely Case

Privileged authenticated attackers gaining remote code execution on the server, enabling them to modify security policies, disable protection, or install backdoors.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and principle of least privilege limiting access to the administration interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated high-privileged access but involves simple command injection once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.5.14, 8.6.6, 8.7.4, or 8.8.2

Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2022-0008.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from VMware's support portal. 2. Backup the system and configuration. 3. Apply the patch following VMware's installation guide. 4. Restart the Carbon Black App Control services or server as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the Carbon Black App Control administration interface to only trusted management networks and specific administrative IP addresses.

Privilege Reduction

all

Apply principle of least privilege to administrative accounts and review/remove unnecessary high-privileged accounts from the administration interface.

🧯 If You Can't Patch

  • Implement strict network access controls to limit administration interface access to specific IP addresses only.
  • Enable multi-factor authentication for all administrative accounts and implement strong password policies.

🔍 How to Verify

Check if Vulnerable:

Check the Carbon Black App Control version in the administration interface under System > About. Compare against affected versions.

Check Version:

In the Carbon Black App Control web interface, navigate to System > About to view the version.

Verify Fix Applied:

Verify the version shows 8.5.14, 8.6.6, 8.7.4, or 8.8.2 or higher in the administration interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful login
  • Administrative actions from unexpected IP addresses or users

Network Indicators:

  • Unusual outbound connections from the Carbon Black server
  • Traffic to the administration interface from non-standard sources

SIEM Query:

source="carbonblack" AND (event_type="command_execution" OR user="admin" AND action="*inject*" OR src_ip NOT IN [trusted_admin_ips])

🔗 References

📤 Share & Export