CVE-2022-32272

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to escalate privileges in OPSWAT MetaDefender products due to incorrect access control. Affected systems include MetaDefender Core, ICAP, and Email Gateway Security before specific versions. Attackers could gain administrative access to security systems.

💻 Affected Systems

Products:
  • OPSWAT MetaDefender Core
  • OPSWAT MetaDefender ICAP
  • OPSWAT MetaDefender Email Gateway Security
Versions: MetaDefender Core before 5.1.2, MetaDefender ICAP before 4.12.1, MetaDefender Email Gateway Security before 5.6.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative access to security infrastructure, allowing attackers to disable protections, exfiltrate data, or pivot to other systems.

🟠

Likely Case

Unauthorized administrative access to MetaDefender management interfaces, enabling configuration changes, policy bypass, or data access.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH if management interfaces are exposed to internet, as exploit appears unauthenticated.
🏢 Internal Only: HIGH due to privilege escalation nature allowing lateral movement once initial access is gained.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on Packet Storm, suggesting trivial exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: MetaDefender Core 5.1.2+, MetaDefender ICAP 4.12.1+, MetaDefender Email Gateway Security 5.6.1+

Vendor Advisory: https://docs.opswat.com/mdcore/release-notes

Restart Required: Yes

Instructions:

1. Download latest version from OPSWAT portal. 2. Backup configuration. 3. Install update following vendor documentation. 4. Restart services. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to MetaDefender management interfaces to trusted IPs only

iptables -A INPUT -p tcp --dport [management_port] -s [trusted_ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [management_port] -j DROP

Access Control Lists

windows

Implement strict firewall rules to limit management interface access

netsh advfirewall firewall add rule name="Block MetaDefender Management" dir=in action=block protocol=TCP localport=[management_port] remoteip=any

🧯 If You Can't Patch

  • Isolate MetaDefender systems in separate VLAN with strict access controls
  • Implement network monitoring for unauthorized access attempts to management interfaces

🔍 How to Verify

Check if Vulnerable:

Check version in MetaDefender web interface or via API. Compare against affected versions.

Check Version:

curl -k https://[metadefender_ip]:[port]/api/version

Verify Fix Applied:

Confirm version is 5.1.2+ for Core, 4.12.1+ for ICAP, or 5.6.1+ for Email Gateway. Test privilege escalation attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to administrative endpoints
  • Privilege escalation attempts in application logs
  • Configuration changes from non-admin users

Network Indicators:

  • Unusual traffic to MetaDefender management ports from unexpected sources
  • Authentication bypass patterns in HTTP requests

SIEM Query:

source="metadefender*" AND (event_type="auth_failure" OR event_type="privilege_escalation" OR endpoint="/api/admin/*")

🔗 References

📤 Share & Export