CVE-2022-32268
📋 TL;DR
CVE-2022-32268 allows remote code execution in StarWind SAN and NAS via a command injection vulnerability in the REST API. Attackers with non-root user access can inject arbitrary commands that execute with root privileges by manipulating the hostname parameter. This affects StarWind SAN and NAS v0.2 build 1914 installations.
💻 Affected Systems
- StarWind SAN and NAS
📦 What is this software?
Starwind San \& Nas by Starwindsoftware
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with root-level access, allowing data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Attacker gains full administrative control over the storage system, potentially accessing sensitive data and disrupting storage operations.
If Mitigated
Limited impact if proper network segmentation and access controls prevent unauthorized users from reaching the REST API.
🎯 Exploit Status
Exploitation requires existing user access to the REST API. The vulnerability is straightforward command injection.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v0.2 build 1915 or later
Vendor Advisory: https://www.starwindsoftware.com/security/sw-20220531-0001/
Restart Required: Yes
Instructions:
1. Download the latest version from StarWind support portal. 2. Backup configuration and data. 3. Install the update following vendor documentation. 4. Restart the system.
🔧 Temporary Workarounds
Restrict REST API Access
linuxLimit network access to the REST API endpoint using firewall rules.
iptables -A INPUT -p tcp --dport [REST_API_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [REST_API_PORT] -j DROP
Disable Unnecessary REST API
linuxIf REST API functionality is not required, disable it completely.
systemctl stop [starwind_rest_api_service]
systemctl disable [starwind_rest_api_service]
🧯 If You Can't Patch
- Implement strict network segmentation to isolate StarWind systems from untrusted networks.
- Apply principle of least privilege to user accounts and monitor for suspicious REST API activity.
🔍 How to Verify
Check if Vulnerable:
Check the installed version via StarWind management interface or CLI. If version is v0.2 build 1914, the system is vulnerable.
Check Version:
starwind-cli --version or check via web management interface
Verify Fix Applied:
Verify the version is updated to v0.2 build 1915 or later and test that hostname changes via REST API properly validate input.
📡 Detection & Monitoring
Log Indicators:
- Unusual hostname change requests in REST API logs
- Suspicious command execution in system logs
Network Indicators:
- Unexpected connections to REST API port from unauthorized sources
- Anomalous outbound connections from StarWind system
SIEM Query:
source="starwind.log" AND ("hostname change" OR "REST API injection")