CVE-2022-24798

7.5 HIGH

📋 TL;DR

IRRd version 4.2.x improperly exposed password hashes in query responses for mntner objects and database exports, allowing attackers to retrieve hashes, brute-force passwords, and make unauthorized changes to IRR objects. This only affects authoritative IRRd instances (not mirrors) that process password hashes. Users of IRRd 4.2.x series are vulnerable.

💻 Affected Systems

Products:
  • IRRd (Internet Routing Registry daemon)
Versions: IRRd 4.2.0 through 4.2.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects IRRd instances serving authoritative databases that process password hashes; mirrors are not affected. IRRd 4.1.x series was never vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain password hashes, crack them offline, gain unauthorized access to modify IRR routing objects, potentially causing routing hijacks or BGP misconfigurations affecting network traffic.

🟠

Likely Case

Attackers retrieve password hashes from exposed instances, attempt brute-force attacks, and if successful, make unauthorized modifications to IRR database entries.

🟢

If Mitigated

With proper patching, no exposure occurs; password hashes remain filtered in responses, preventing hash retrieval and subsequent attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires querying the IRRd service to retrieve password hashes, which can be done without authentication via standard IRR queries.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IRRd 4.2.3 or main branch

Vendor Advisory: https://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw

Restart Required: Yes

Instructions:

1. Backup current IRRd configuration and data. 2. Stop the IRRd service. 3. Upgrade to IRRd 4.2.3 or later using package manager or source. 4. Restart the IRRd service. 5. Verify the fix by checking version and testing queries.

🔧 Temporary Workarounds

No workarounds available

all

The vendor states there are no known workarounds; upgrading is the only solution.

🧯 If You Can't Patch

  • Disable or restrict access to the IRRd service from untrusted networks to reduce exposure.
  • Monitor logs for unusual query patterns or attempts to access mntner objects, and consider temporary service shutdown if patching is delayed.

🔍 How to Verify

Check if Vulnerable:

Check IRRd version: if running 4.2.0 to 4.2.2 and serving authoritative databases, it is vulnerable. Test by querying mntner objects to see if password hashes are exposed in responses.

Check Version:

irrd --version or check service logs/configuration for version info

Verify Fix Applied:

After patching, verify version is 4.2.3 or later, and confirm password hashes are no longer visible in query responses for mntner objects or exports.

📡 Detection & Monitoring

Log Indicators:

  • Unusual increase in queries for mntner objects, especially from external IPs
  • Log entries showing hash retrieval attempts in query responses

Network Indicators:

  • Increased traffic to IRRd port (typically 43 or 4321) with queries targeting mntner objects
  • Patterns of repeated queries from single sources

SIEM Query:

source="irrd.log" AND (query="*mntner*" OR response_contains="*crypt*" OR response_contains="*hash*")

🔗 References

📤 Share & Export