CVE-2022-33754

9.8 CRITICAL

📋 TL;DR

CVE-2022-33754 is a critical remote code execution vulnerability in CA Automic Automation agents due to insufficient input validation. Attackers can exploit this to execute arbitrary code on affected systems. Organizations using CA Automic Automation 12.2 or 12.3 are vulnerable.

💻 Affected Systems

Products:
  • CA Automic Automation
Versions: 12.2 and 12.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary code with highest privileges, potentially leading to data theft, ransomware deployment, or complete system takeover.

🟠

Likely Case

Remote code execution leading to installation of malware, backdoors, or lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - Remote attackers can exploit this vulnerability without authentication if the agent is exposed to the internet.
🏢 Internal Only: HIGH - Even internally, this vulnerability can be exploited by attackers who gain initial access to the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has a low attack complexity, making it highly exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Broadcom security advisory

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/20629

Restart Required: Yes

Instructions:

1. Review Broadcom security advisory 2. Download and apply the appropriate patch for your version 3. Restart affected Automic Automation services 4. Verify patch installation

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Automic Automation agents to only trusted systems

Use firewall rules to block inbound connections to Automic agent ports from untrusted networks

Access Control

all

Implement strict network access controls and authentication requirements

Configure network ACLs to limit which IP addresses can communicate with Automic agents

🧯 If You Can't Patch

  • Isolate affected systems in a separate network segment with strict access controls
  • Implement additional monitoring and intrusion detection for suspicious activity targeting Automic agents

🔍 How to Verify

Check if Vulnerable:

Check Automic Automation version via administrative console or by examining installed software version

Check Version:

Check version in Automic Automation administrative interface or installation directory

Verify Fix Applied:

Verify patch installation through administrative console or by checking version against patched releases

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from Automic agent
  • Suspicious network connections to agent ports
  • Authentication bypass attempts

Network Indicators:

  • Unexpected traffic to Automic agent ports (typically TCP 2210-2219)
  • Malformed packets targeting Automic services

SIEM Query:

source="automic*" AND (event_type="process_execution" OR dest_port=2210-2219) AND suspicious_pattern

🔗 References

📤 Share & Export