CVE-2022-29556
📋 TL;DR
This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Northern.tech's Mender Enterprise iot-manager microservice. It allows attackers to make unauthorized requests to internal API endpoints, potentially executing cross-tenant actions in Azure IoT Hub integrations. Organizations using affected versions of Mender Enterprise with Azure IoT Hub integration are vulnerable.
💻 Affected Systems
- Northern.tech Mender Enterprise
📦 What is this software?
Mender by Northern.tech
Mender by Northern.tech
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive internal systems, perform cross-tenant actions in Azure IoT Hub, potentially compromising other tenants' IoT devices and data, and pivot to internal network resources.
Likely Case
Unauthorized access to internal API endpoints, potential data leakage from internal services, and limited cross-tenant actions within the Azure IoT Hub environment.
If Mitigated
With proper network segmentation and access controls, impact would be limited to the iot-manager service itself with minimal data exposure.
🎯 Exploit Status
Exploitation requires access to the iot-manager service and knowledge of internal API endpoints. The SSRF primitives in Azure IoT Hub integration provide the attack surface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Mender Enterprise 3.2.2
Vendor Advisory: https://mender.io/blog/cve-2022-29555-and-cve-2022-29556-vulnerabilities-in-iot-manager-and-deviceconnect
Restart Required: Yes
Instructions:
1. Upgrade Mender Enterprise to version 3.2.2 or later. 2. Update the iot-manager microservice. 3. Restart all Mender Enterprise services. 4. Verify the Azure IoT Hub integration functions correctly post-upgrade.
🔧 Temporary Workarounds
Disable Azure IoT Hub Integration
allTemporarily disable the vulnerable Azure IoT Hub integration feature
# Configuration depends on Mender deployment method
# Consult Mender documentation for disabling specific integrations
Network Segmentation
linuxRestrict iot-manager service network access to only required endpoints
# Use firewall rules to limit outbound connections from iot-manager
# Example: iptables -A OUTPUT -p tcp --dport 443 -d required.api.endpoints -j ACCEPT
# iptables -A OUTPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate iot-manager from sensitive internal systems
- Monitor all outbound requests from iot-manager for suspicious patterns targeting internal endpoints
🔍 How to Verify
Check if Vulnerable:
Check Mender Enterprise version: if below 3.2.2 and Azure IoT Hub integration is enabled, the system is vulnerable. Verify iot-manager microservice version is 1.0.0.
Check Version:
mender version | grep -i version
Verify Fix Applied:
Confirm Mender Enterprise version is 3.2.2 or higher and iot-manager microservice has been updated. Test Azure IoT Hub integration functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from iot-manager to internal IP addresses
- Failed authentication attempts to internal API endpoints from iot-manager service
- Azure IoT Hub integration errors or unusual activity patterns
Network Indicators:
- HTTP requests from iot-manager to non-Azure internal endpoints
- Unusual port scanning or service discovery from iot-manager host
- Traffic to internal API endpoints that shouldn't be accessed by iot-manager
SIEM Query:
source="iot-manager" AND (dest_ip=10.0.0.0/8 OR dest_ip=172.16.0.0/12 OR dest_ip=192.168.0.0/16) AND http_method=*