CVE-2022-31483

9.1 CRITICAL

📋 TL;DR

This is a path traversal vulnerability in HID Mercury Intelligent Controllers that allows authenticated attackers to upload files anywhere on the filesystem. Attackers can overwrite system files and install persistent backdoors to gain root access. Affected products include LP1501, LP1502, LP2500, LP4502, and EP4502 controllers with firmware versions before 1.271.

💻 Affected Systems

Products:
  • HID Mercury Intelligent Controller LP1501
  • HID Mercury Intelligent Controller LP1502
  • HID Mercury Intelligent Controller LP2500
  • HID Mercury Intelligent Controller LP4502
  • HID Mercury Intelligent Controller EP4502
Versions: All firmware versions prior to 1.271
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the controller's web interface or API.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level remote access, allowing attackers to disable security controls, steal credentials, and pivot to other network systems.

🟠

Likely Case

Persistence establishment through startup service installation, enabling ongoing remote access and potential data exfiltration from the controller system.

🟢

If Mitigated

Limited impact with proper network segmentation and file integrity monitoring, potentially detecting unauthorized file modifications.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses simple path traversal techniques that are well-understood by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 1.271 or later

Vendor Advisory: https://www.corporate.carrier.com/product-security/advisories-resources/

Restart Required: Yes

Instructions:

1. Download firmware version 1.271 or later from HID/Carrier support portal. 2. Backup current configuration. 3. Upload firmware via web interface. 4. Apply firmware update. 5. Reboot controller. 6. Verify firmware version.

🔧 Temporary Workarounds

Restrict File Upload Functionality

all

Disable or restrict file upload features in controller configuration if not required for operations.

Implement File Integrity Monitoring

linux

Monitor critical system directories for unauthorized file modifications using tools like AIDE or Tripwire.

aide --init
aide --check

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate controllers from critical networks
  • Enforce strong authentication policies and monitor for suspicious file upload activities

🔍 How to Verify

Check if Vulnerable:

Check firmware version via controller web interface or SSH: cat /etc/version or similar version file

Check Version:

cat /proc/version || cat /etc/*release || find / -name '*version*' -type f | xargs cat

Verify Fix Applied:

Verify firmware version is 1.271 or higher and test file upload functionality with path traversal attempts

📡 Detection & Monitoring

Log Indicators:

  • File upload logs containing '..' or '/' sequences
  • Unauthorized file modifications in system directories
  • New service installations in /etc/init.d or similar

Network Indicators:

  • Unusual outbound connections from controller to external IPs
  • SSH or reverse shell connections originating from controller

SIEM Query:

source="controller_logs" AND ("file upload" AND (".." OR "/")) OR ("service install" OR "startup script")

🔗 References

📤 Share & Export