CVE-2022-33754
📋 TL;DR
CVE-2022-33754 is a critical remote code execution vulnerability in CA Automic Automation agents due to insufficient input validation. Attackers can exploit this to execute arbitrary code on affected systems. Organizations using CA Automic Automation 12.2 or 12.3 are vulnerable.
💻 Affected Systems
- CA Automic Automation
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attacker to execute arbitrary code with highest privileges, potentially leading to data theft, ransomware deployment, or complete system takeover.
Likely Case
Remote code execution leading to installation of malware, backdoors, or lateral movement within the network.
If Mitigated
Limited impact if proper network segmentation and access controls prevent exploitation attempts.
🎯 Exploit Status
The vulnerability requires no authentication and has a low attack complexity, making it highly exploitable.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply patches from Broadcom security advisory
Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/20629
Restart Required: Yes
Instructions:
1. Review Broadcom security advisory 2. Download and apply the appropriate patch for your version 3. Restart affected Automic Automation services 4. Verify patch installation
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to Automic Automation agents to only trusted systems
Use firewall rules to block inbound connections to Automic agent ports from untrusted networks
Access Control
allImplement strict network access controls and authentication requirements
Configure network ACLs to limit which IP addresses can communicate with Automic agents
🧯 If You Can't Patch
- Isolate affected systems in a separate network segment with strict access controls
- Implement additional monitoring and intrusion detection for suspicious activity targeting Automic agents
🔍 How to Verify
Check if Vulnerable:
Check Automic Automation version via administrative console or by examining installed software version
Check Version:
Check version in Automic Automation administrative interface or installation directory
Verify Fix Applied:
Verify patch installation through administrative console or by checking version against patched releases
📡 Detection & Monitoring
Log Indicators:
- Unusual process execution from Automic agent
- Suspicious network connections to agent ports
- Authentication bypass attempts
Network Indicators:
- Unexpected traffic to Automic agent ports (typically TCP 2210-2219)
- Malformed packets targeting Automic services
SIEM Query:
source="automic*" AND (event_type="process_execution" OR dest_port=2210-2219) AND suspicious_pattern