CVE-2022-24387

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers with administrator or admin privileges in SmarterTrack to overwrite critical configuration files in the app_data/Config folder, potentially leading to system compromise. It affects SmarterTrack v100.0.8019.14010 and requires admin-level access to exploit.

💻 Affected Systems

Products:
  • SmarterTrack
Versions: v100.0.8019.14010
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin or administrator privileges to exploit. The vulnerability is in the application logic, not dependent on specific OS configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover through configuration file manipulation, enabling remote code execution, data theft, or service disruption.

🟠

Likely Case

Unauthorized modification of system settings, privilege escalation, or denial of service through corrupted configuration files.

🟢

If Mitigated

Limited impact if proper access controls restrict admin privileges and file permissions are correctly configured.

🌐 Internet-Facing: HIGH if the SmarterTrack instance is exposed to the internet with admin accounts accessible.
🏢 Internal Only: MEDIUM as it requires admin credentials but could be exploited by malicious insiders or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once access is obtained. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v100.0.8020 or later (check vendor for exact fixed version)

Vendor Advisory: https://csirt.divd.nl/CVE-2022-24387/

Restart Required: Yes

Instructions:

1. Backup configuration files from app_data/Config folder. 2. Download and install the latest SmarterTrack version from the official vendor. 3. Restart the SmarterTrack service. 4. Verify configuration files are intact.

🔧 Temporary Workarounds

Restrict File Permissions

all

Set strict read-only permissions on the app_data/Config folder to prevent unauthorized writes.

Windows: icacls "C:\Program Files\SmarterTrack\app_data\Config" /deny Everyone:(W)
Linux: chmod 444 /opt/smartertrack/app_data/Config/*

Limit Admin Access

all

Reduce the number of admin accounts and implement strong authentication controls.

🧯 If You Can't Patch

  • Implement network segmentation to isolate SmarterTrack from critical systems.
  • Enable detailed logging and monitoring of file modifications in the Config folder.

🔍 How to Verify

Check if Vulnerable:

Check SmarterTrack version in admin interface or installation directory. If version is v100.0.8019.14010 or earlier, it is vulnerable.

Check Version:

Windows: Check Help > About in SmarterTrack admin panel. Linux: Check /opt/smartertrack/version.txt or similar.

Verify Fix Applied:

Verify the installed version is v100.0.8020 or later and test that configuration files cannot be overwritten by admin users.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file write events in app_data/Config folder
  • Admin user modifying systemsettings.xml or other config files

Network Indicators:

  • Unusual admin login patterns or access from unexpected IPs

SIEM Query:

source="smartertrack" AND (event="file_write" AND path="*app_data/Config/*") OR (user="admin" AND action="modify_config")

🔗 References

📤 Share & Export