CVE-2022-25784

9.1 CRITICAL

📋 TL;DR

This cross-site scripting (XSS) vulnerability in Secomea SiteManager's web GUI allows authenticated users to inject malicious scripts. When exploited, these scripts execute in the context of other users' browsers, potentially compromising their sessions or performing unauthorized actions. All SiteManager versions before 9.7 are affected.

💻 Affected Systems

Products:
  • Secomea SiteManager
Versions: All versions prior to 9.7
Operating Systems: Embedded/Linux-based
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web GUI interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator credentials, take full control of the SiteManager device, pivot to connected industrial control systems, and potentially disrupt critical operations.

🟠

Likely Case

Attackers steal session cookies or authentication tokens to impersonate legitimate users, access sensitive configuration data, or modify device settings.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before execution, preventing any impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities are commonly exploited, and this requires only authenticated access (not necessarily admin).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.7 or later

Vendor Advisory: https://www.secomea.com/support/cybersecurity-advisory/

Restart Required: Yes

Instructions:

1. Download SiteManager version 9.7 or later from Secomea support portal. 2. Backup current configuration. 3. Upload and install the new firmware via the web GUI. 4. Reboot the device. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict Web GUI Access

all

Limit access to the SiteManager web interface to trusted IP addresses only using firewall rules.

Implement Web Application Firewall

all

Deploy a WAF with XSS protection rules in front of the SiteManager interface.

🧯 If You Can't Patch

  • Implement strict input validation and output encoding at the application layer if custom development is possible.
  • Monitor for suspicious web requests containing script tags or JavaScript payloads in access logs.

🔍 How to Verify

Check if Vulnerable:

Check the SiteManager firmware version in the web GUI under System > About. If version is below 9.7, the system is vulnerable.

Check Version:

No CLI command available; version check must be performed through the web GUI interface.

Verify Fix Applied:

After updating, verify the version shows 9.7 or higher in the System > About page and test that script injection attempts are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing script tags, JavaScript code, or unusual parameters in web access logs
  • Multiple failed login attempts followed by successful authentication and script-like payloads

Network Indicators:

  • HTTP traffic to SiteManager containing suspicious parameters with script content
  • Outbound connections from SiteManager to unexpected destinations after web GUI access

SIEM Query:

source="sitemanager-logs" AND (http_request CONTAINS "<script>" OR http_request CONTAINS "javascript:" OR http_request CONTAINS "onerror=" OR http_request CONTAINS "onload=")

🔗 References

📤 Share & Export