CVE-2022-33750

9.8 CRITICAL

📋 TL;DR

CVE-2022-33750 is an authentication bypass vulnerability in CA Automic Automation agents that allows remote attackers to execute arbitrary commands without valid credentials. This affects organizations using CA Automic Automation 12.2 and 12.3 for workload automation. The vulnerability enables complete system compromise of affected automation servers.

💻 Affected Systems

Products:
  • CA Automic Automation
Versions: 12.2 and 12.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. The vulnerability exists in the Automic agent component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full control of the Automic agent system, enabling arbitrary command execution, data theft, lateral movement, and deployment of persistent malware.

🟠

Likely Case

Attackers exploit the vulnerability to execute commands on vulnerable agents, potentially compromising automation workflows, stealing credentials, and establishing footholds in the environment.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the isolated automation environment, preventing lateral movement to critical systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The authentication bypass nature makes exploitation straightforward once the vulnerability details are understood. No public exploit code is known, but the vulnerability is easily weaponizable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches provided by Broadcom/CA

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/20629

Restart Required: Yes

Instructions:

1. Download the security patch from Broadcom support portal. 2. Apply the patch to all affected Automic Automation installations. 3. Restart all Automic agents and services. 4. Verify patch application and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Automic Automation systems from untrusted networks and limit access to trusted management IPs only.

Use firewall rules to restrict access to Automic agent ports (default 2210/TCP) to trusted management networks only.

Access Control Lists

linux

Implement network-level access controls to restrict which systems can communicate with Automic agents.

Configure firewall/ACL rules: iptables -A INPUT -p tcp --dport 2210 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 2210 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Automic systems from untrusted networks
  • Deploy host-based firewalls to restrict inbound connections to Automic agent ports

🔍 How to Verify

Check if Vulnerable:

Check Automic Automation version via administrative console or by examining installed software version. Versions 12.2 and 12.3 are vulnerable.

Check Version:

Check version via Automic administrative interface or examine installation directory version files.

Verify Fix Applied:

Verify patch application through administrative console or by checking version information post-patching. Ensure no unauthorized connections to agent ports.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts to Automic agent ports (default 2210)
  • Unusual command execution patterns in Automic logs
  • Authentication bypass attempts in agent logs

Network Indicators:

  • Unexpected network connections to port 2210/TCP from untrusted sources
  • Unusual outbound connections from Automic agents

SIEM Query:

source_port:2210 AND (src_ip NOT IN trusted_networks) OR (automic.agent.auth_bypass_detected)

🔗 References

📤 Share & Export