CVE-2022-37938

9.8 CRITICAL

📋 TL;DR

CVE-2022-37938 is an unauthenticated server-side request forgery (SSRF) vulnerability in HPE Serviceguard Manager that allows attackers to make arbitrary HTTP requests from the vulnerable server. This can lead to internal network reconnaissance, data exfiltration, or chaining with other vulnerabilities. All organizations running affected versions of HPE Serviceguard Manager are vulnerable.

💻 Affected Systems

Products:
  • HPE Serviceguard Manager
Versions: All versions prior to HPE Serviceguard Manager 1.5.0
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the default installation of HPE Serviceguard Manager. No special configuration is required to be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot to internal systems, access sensitive data, or chain with other vulnerabilities to achieve remote code execution on the Serviceguard Manager server or internal systems.

🟠

Likely Case

Attackers would use the vulnerability to scan internal networks, access internal HTTP services, or exfiltrate data from internal systems reachable from the Serviceguard Manager server.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact would be limited to internal reconnaissance of segmented network zones.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and exploitation is straightforward via crafted HTTP requests. While no public PoC exists, the vulnerability is easily weaponizable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: HPE Serviceguard Manager 1.5.0 or later

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbmu04452en_us

Restart Required: Yes

Instructions:

1. Download HPE Serviceguard Manager 1.5.0 or later from the HPE support portal. 2. Stop the Serviceguard Manager service. 3. Install the updated version following HPE's installation guide. 4. Restart the Serviceguard Manager service.

🔧 Temporary Workarounds

Network Segmentation and Firewall Rules

all

Restrict outbound HTTP/HTTPS traffic from the Serviceguard Manager server to only necessary internal systems using firewall rules.

Access Control List

all

Implement network ACLs to restrict access to the Serviceguard Manager web interface to trusted IP addresses only.

🧯 If You Can't Patch

  • Isolate the Serviceguard Manager server in a dedicated network segment with strict egress filtering
  • Implement web application firewall (WAF) rules to block SSRF patterns targeting the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check the Serviceguard Manager version via the web interface or by examining the installation directory. Versions prior to 1.5.0 are vulnerable.

Check Version:

Check the web interface or consult HPE documentation for version verification commands specific to your installation.

Verify Fix Applied:

Verify the installed version is 1.5.0 or later and test that SSRF attempts are blocked or properly handled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the Serviceguard Manager server
  • HTTP requests to internal systems from the Serviceguard Manager IP

Network Indicators:

  • HTTP traffic from Serviceguard Manager to unexpected internal destinations
  • Patterns of SSRF exploitation in web server logs

SIEM Query:

source_ip="Serviceguard_Manager_IP" AND (dest_port=80 OR dest_port=443) AND dest_ip NOT IN [allowed_internal_ips]

🔗 References

📤 Share & Export