CVE-2022-23650
📋 TL;DR
CVE-2022-23650 is a hard-coded cryptographic key vulnerability in Netmaker server components that allows attackers with knowledge of the admin username and server address to execute administrative commands remotely. This affects Netmaker server deployments prior to patched versions, potentially enabling unauthorized network control and data access. Only the server component is vulnerable, not client installations.
💻 Affected Systems
- Netmaker
📦 What is this software?
Netmaker by Gravitl
Netmaker by Gravitl
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the Netmaker server allowing attacker to reconfigure network topology, intercept traffic, add/remove users, and potentially pivot to other systems in the network.
Likely Case
Unauthorized administrative access leading to network configuration changes, user management compromise, and potential data interception.
If Mitigated
Limited impact if server is behind strict network controls, but still represents significant authentication bypass risk.
🎯 Exploit Status
Exploitation requires knowledge of admin username and server address. The hard-coded key is publicly visible in source code.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v0.8.5, v0.9.4, or v0.10.0
Vendor Advisory: https://github.com/gravitl/netmaker/security/advisories/GHSA-86f3-hf24-76q4
Restart Required: Yes
Instructions:
1. Backup current Netmaker configuration. 2. Update Netmaker to v0.8.5, v0.9.4, or v0.10.0 using your package manager or from source. 3. Restart Netmaker service. 4. Verify new version is running.
🔧 Temporary Workarounds
No workarounds available
allVendor states there are no known workarounds for this vulnerability
🧯 If You Can't Patch
- Isolate Netmaker server from internet and restrict network access to only trusted administrative IPs
- Implement additional authentication layers and monitor for unauthorized administrative commands
🔍 How to Verify
Check if Vulnerable:
Check Netmaker version: if running version older than v0.8.5, v0.9.4, or v0.10.0, system is vulnerable
Check Version:
netmaker version or check docker container tag if using containers
Verify Fix Applied:
Confirm Netmaker version is v0.8.5, v0.9.4, or v0.10.0 or newer
📡 Detection & Monitoring
Log Indicators:
- Unexpected admin command execution
- Authentication attempts from unusual IPs
- Configuration changes not initiated by authorized admins
Network Indicators:
- Unusual administrative API calls to Netmaker server
- Traffic patterns suggesting network reconfiguration
SIEM Query:
source="netmaker" AND (event="admin_command" OR event="auth_failure") | stats count by src_ip
🔗 References
- https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee
- https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080
- https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87
- https://github.com/gravitl/netmaker/security/advisories/GHSA-86f3-hf24-76q4
- https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee
- https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080
- https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87
- https://github.com/gravitl/netmaker/security/advisories/GHSA-86f3-hf24-76q4