CVE-2022-24394

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary system commands on Fidelis Network and Deception CommandPost servers through command injection in the web interface. Attackers can inject commands via the 'filename' parameter when making HTTP requests, potentially gaining full control of affected systems. Organizations running vulnerable versions of Fidelis Network or Deception prior to 9.4.5 are affected.

💻 Affected Systems

Products:
  • Fidelis Network
  • Fidelis Deception
Versions: All versions prior to 9.4.5
Operating Systems: Not specified - vulnerability is in application layer
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the CommandPost web interface. The vulnerability exists in the application's handling of the 'filename' parameter.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the CommandPost server, allowing attackers to execute arbitrary commands with system privileges, steal sensitive data, deploy ransomware, pivot to other network systems, and maintain persistent access.

🟠

Likely Case

Attackers with authenticated access (compromised credentials or insider threat) execute commands to exfiltrate network security data, modify security policies, or establish backdoors for future access.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring that detects unusual command execution patterns before significant damage occurs.

🌐 Internet-Facing: HIGH if CommandPost web interface is exposed to the internet, as authenticated attackers could exploit remotely.
🏢 Internal Only: HIGH as authenticated internal users or compromised internal accounts can exploit this vulnerability to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authentication is obtained. The vulnerability is in a core parameter that likely receives user input.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.4.5 and later

Vendor Advisory: https://fidelissecurity.zendesk.com/hc/en-us/articles/6211730139411

Restart Required: Yes

Instructions:

1. Download the 9.4.5 or later update from Fidelis support portal. 2. Backup current configuration and data. 3. Apply the update following vendor instructions. 4. Restart the CommandPost service or server as required. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to the CommandPost web interface to only trusted IP addresses and networks using firewall rules.

Enforce Strong Authentication

all

Implement multi-factor authentication and strong password policies to reduce risk of credential compromise.

🧯 If You Can't Patch

  • Implement network segmentation to isolate CommandPost servers from critical systems
  • Enable detailed logging and monitoring for unusual command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check the CommandPost version via the web interface admin panel or system information. If version is below 9.4.5, the system is vulnerable.

Check Version:

Check via web interface: Admin > System Information, or consult vendor documentation for CLI version check.

Verify Fix Applied:

After patching, verify the version shows 9.4.5 or higher. Test the 'update_checkfile' functionality to ensure command injection is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login
  • HTTP requests with unusual characters in 'filename' parameter

Network Indicators:

  • Unusual outbound connections from CommandPost server
  • HTTP responses containing command output that shouldn't be in web responses

SIEM Query:

source="commandpost.log" AND ("update_checkfile" OR "filename=" AND ("|" OR ";" OR "$" OR "`"))

🔗 References

📤 Share & Export