CVE-2022-24237

8.8 HIGH

📋 TL;DR

CVE-2022-24237 is a command injection vulnerability in Snapt Aria's snaptPowered2 component that allows authenticated attackers to execute arbitrary commands on affected systems. This affects Snapt Aria v12.8 installations where attackers have valid credentials. The vulnerability enables remote code execution with the privileges of the running service.

💻 Affected Systems

Products:
  • Snapt Aria
Versions: v12.8
Operating Systems: Linux-based systems where Snapt Aria is deployed
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the vulnerable component. The snaptPowered2 component is part of the Aria application delivery controller.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, lateral movement, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution leading to service disruption, data exfiltration, or installation of cryptocurrency miners.

🟢

If Mitigated

Limited impact due to network segmentation, minimal privileges, and strong authentication controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once credentials are obtained. Public disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v12.9 or later

Vendor Advisory: https://www.snapt.net/platforms/aria-adc

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install Snapt Aria v12.9 or later from official vendor sources. 3. Restart the Aria service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to the Snapt Aria management interface to trusted IP addresses only.

iptables -A INPUT -p tcp --dport [ARIA_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [ARIA_PORT] -j DROP

Authentication Hardening

all

Implement strong password policies, multi-factor authentication, and account lockout mechanisms.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Snapt Aria from critical systems.
  • Monitor for suspicious command execution patterns and implement application allowlisting.

🔍 How to Verify

Check if Vulnerable:

Check the Snapt Aria version via the web interface or configuration files. If version is 12.8, the system is vulnerable.

Check Version:

grep -i version /opt/snapt/aria/version.txt || check web interface at https://[ARIA_IP]:[PORT]/admin

Verify Fix Applied:

Verify the version is 12.9 or later and test that command injection attempts are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Failed authentication attempts followed by successful logins
  • Processes spawned from the snaptPowered2 component with unusual arguments

Network Indicators:

  • Unexpected outbound connections from the Aria server
  • Traffic to known malicious IPs or domains

SIEM Query:

source="snapt_aria.log" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export