CVE-2022-24392

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary system commands on Fidelis Network and Deception CommandPost through command injection in the web interface. Attackers can inject commands via the 'feed' parameter and receive results in HTTP responses. Organizations running affected Fidelis versions prior to 9.4.5 are at risk.

💻 Affected Systems

Products:
  • Fidelis Network
  • Fidelis Deception
Versions: Versions prior to 9.4.5
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface. The vulnerability is present in CommandPost components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with web server privileges, potentially leading to lateral movement, data exfiltration, or complete system takeover.

🟠

Likely Case

Authenticated attackers gaining command execution capabilities to compromise the CommandPost server, potentially accessing sensitive network data or deploying additional payloads.

🟢

If Mitigated

Limited impact due to authentication requirements and network segmentation, with attackers only able to execute commands within web server context on isolated systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection is straightforward once authenticated. No public exploit code was mentioned in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.4.5

Vendor Advisory: https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411

Restart Required: Yes

Instructions:

1. Download Fidelis version 9.4.5 or later from official sources. 2. Backup current configuration and data. 3. Apply the update following Fidelis upgrade procedures. 4. Restart affected services as required. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to the Fidelis web interface to only trusted administrative networks and IP addresses.

Configure firewall rules to restrict access to CommandPost web interface ports (typically 443/TCP)

Implement Strong Authentication Controls

all

Enforce multi-factor authentication and strong password policies for all administrative accounts.

Enable MFA in Fidelis administration settings
Set minimum password length to 12+ characters with complexity requirements

🧯 If You Can't Patch

  • Implement network segmentation to isolate Fidelis systems from critical infrastructure
  • Monitor for suspicious command execution patterns and authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check Fidelis version via web interface admin panel or command line. Versions below 9.4.5 are vulnerable.

Check Version:

Check web interface admin dashboard or consult Fidelis documentation for version check commands specific to your deployment.

Verify Fix Applied:

Verify version is 9.4.5 or higher and test that command injection attempts via the 'feed' parameter are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful login
  • HTTP requests containing shell metacharacters in 'feed' parameter

Network Indicators:

  • Unusual outbound connections from CommandPost server
  • HTTP responses containing command output data

SIEM Query:

source="fidelis_logs" AND (feed_comm_test OR feed=* OR command=*) AND (response_code=200 OR auth_success=true)

🔗 References

📤 Share & Export