CVE-2022-33756

7.5 HIGH

📋 TL;DR

CVE-2022-33756 is an entropy weakness vulnerability in CA Automic Automation Engine that could allow remote attackers to potentially access sensitive data. This affects organizations using CA Automic Automation versions 12.2 and 12.3 for workload automation and orchestration.

💻 Affected Systems

Products:
  • CA Automic Automation
Versions: 12.2 and 12.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Automation Engine component specifically. All deployments with these versions are vulnerable unless patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains unauthorized access to sensitive data including credentials, configuration details, or business process information stored in the automation system.

🟠

Likely Case

Information disclosure of system configuration or automation job data that could facilitate further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to vulnerable components.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

The vulnerability involves entropy weakness which typically requires specialized knowledge to exploit effectively.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches referenced in Broadcom security advisories

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/20629

Restart Required: Yes

Instructions:

1. Review Broadcom security advisory 20629. 2. Download appropriate patches from Broadcom support portal. 3. Apply patches following vendor documentation. 4. Restart affected services.

🔧 Temporary Workarounds

Network segmentation

all

Restrict network access to Automation Engine to trusted internal networks only

Access control hardening

all

Implement strict firewall rules and authentication requirements for Automation Engine access

🧯 If You Can't Patch

  • Isolate the Automation Engine from internet-facing networks and untrusted systems
  • Implement additional monitoring and logging for suspicious access attempts to the vulnerable component

🔍 How to Verify

Check if Vulnerable:

Check installed version of CA Automic Automation via product interface or installation directory

Check Version:

Check product documentation for version verification - typically via product interface or installation logs

Verify Fix Applied:

Verify patch installation through product version check and confirm with vendor patch verification steps

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Unexpected data access attempts to Automation Engine
  • Failed entropy-related operations

Network Indicators:

  • Unusual traffic patterns to Automation Engine ports
  • External IP addresses accessing internal automation services

SIEM Query:

source="automic*" AND (event_type="authentication" OR event_type="data_access") AND result="failure"

🔗 References

📤 Share & Export