CVE-2022-2310

10.0 CRITICAL

📋 TL;DR

CVE-2022-2310 is an authentication bypass vulnerability in Skyhigh Secure Web Gateway (SWG) that allows remote attackers to access the administration interface as super user without valid credentials. This affects organizations using Skyhigh SWG main releases 10.x, 9.x, 8.x, and controlled release 11.x. Attackers gain complete control over the SWG appliance.

💻 Affected Systems

Products:
  • Skyhigh Secure Web Gateway (SWG)
Versions: Main releases: 10.x prior to 10.2.12, 9.x prior to 9.2.23, 8.x prior to 8.2.28; Controlled release: 11.x prior to 11.2.1
Operating Systems: Appliance-based, OS not specified
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the SWG appliance allowing attackers to intercept, modify, or block all web traffic, deploy malware, steal credentials, and pivot to internal networks.

🟠

Likely Case

Unauthorized administrative access leading to configuration changes, traffic interception, and potential data exfiltration.

🟢

If Mitigated

Limited impact if SWG is isolated in a management network with strict access controls and monitoring.

🌐 Internet-Facing: HIGH - The vulnerability allows remote unauthenticated access to the admin interface, making internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally deployed instances are vulnerable to attackers who gain network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves whitelisting authentication bypass methods and weak crypto, suggesting relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.2.12, 9.2.23, 8.2.28, or 11.2.1 depending on release track

Vendor Advisory: https://kcm.trellix.com/corporate/index?page=content&id=SB10384

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Skyhigh/Trellix support portal. 2. Backup current configuration. 3. Apply the patch following vendor instructions. 4. Restart the SWG appliance. 5. Verify the patch was successful.

🔧 Temporary Workarounds

Restrict Admin Interface Access

all

Limit access to the SWG admin interface to specific trusted IP addresses or networks only.

Configure firewall rules to restrict access to SWG admin interface (typically port 443) to management network only

Disable Remote Admin Access

all

Temporarily disable remote administrative access if possible and use local console access only.

Disable remote admin interface in SWG configuration if supported

🧯 If You Can't Patch

  • Isolate the SWG appliance in a dedicated management network with strict firewall rules
  • Implement network segmentation to limit the SWG's ability to access sensitive internal resources

🔍 How to Verify

Check if Vulnerable:

Check SWG version in admin interface under System > About or via CLI. Compare against affected versions.

Check Version:

Check via SWG admin interface or vendor-specific CLI commands

Verify Fix Applied:

Verify version is 10.2.12, 9.2.23, 8.2.28, or 11.2.1 or higher. Test authentication bypass attempts should fail.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful admin login from unexpected IPs
  • Configuration changes made by unknown users
  • Admin login events outside normal hours

Network Indicators:

  • Unusual traffic patterns to/from SWG admin interface
  • Traffic from SWG to unexpected internal destinations

SIEM Query:

source="swg_logs" AND (event_type="admin_login" AND result="success" AND user="superuser") OR (event_type="config_change" AND user NOT IN ["authorized_users"])

🔗 References

📤 Share & Export