CVE-2022-41763

8.8 HIGH

📋 TL;DR

CVE-2022-41763 is a remote code execution vulnerability in NOKIA AMS 9.7.05 where authenticated remote users can inject code via the debugger of the ipAddress variable in the PING function. This allows attackers to execute arbitrary commands with the privileges of the service account. Organizations running vulnerable versions of NOKIA AMS are affected.

💻 Affected Systems

Products:
  • NOKIA AMS
Versions: 9.7.05
Operating Systems: Not specified, likely multiple
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to the AMS server, but default configurations may be vulnerable if standard credentials are used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing attackers to install malware, exfiltrate data, pivot to other systems, or disrupt operations.

🟠

Likely Case

Unauthorized command execution leading to data theft, service disruption, or lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, least privilege service accounts, and proper authentication controls.

🌐 Internet-Facing: HIGH if AMS is exposed to the internet, as authenticated attackers can exploit remotely.
🏢 Internal Only: HIGH for internal networks, as authenticated users can exploit from within the network perimeter.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once authenticated. The vulnerability is in a debugger function, suggesting it may be easily weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references; check NOKIA advisories for updated version.

Vendor Advisory: https://www.gruppotim.it/it/footer/red-team.html

Restart Required: Yes

Instructions:

1. Check NOKIA's official advisory for patch details. 2. Download and apply the latest patch from NOKIA. 3. Restart the AMS service to apply changes. 4. Verify the fix using version checks.

🔧 Temporary Workarounds

Disable Debugger Functions

all

Disable or restrict access to debugger features in AMS to prevent code injection.

Specific commands depend on AMS configuration; consult NOKIA documentation.

Network Segmentation

all

Isolate AMS servers from untrusted networks and limit access to authenticated users only.

Configure firewall rules to restrict inbound traffic to AMS ports.

🧯 If You Can't Patch

  • Implement strict access controls to limit authentication to trusted users only.
  • Monitor AMS logs for suspicious activity related to PING or debugger functions.

🔍 How to Verify

Check if Vulnerable:

Check the AMS version; if it is 9.7.05, it is vulnerable. Use version check commands or review system documentation.

Check Version:

Consult NOKIA AMS documentation for specific version check commands; typically involves checking service logs or configuration files.

Verify Fix Applied:

After patching, confirm the version is updated to a non-vulnerable release and test PING functionality for anomalies.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PING requests with code-like strings in ipAddress parameters.
  • Authentication logs showing unexpected user access to AMS debugger functions.

Network Indicators:

  • Suspicious network traffic to AMS ports involving PING commands with payloads.

SIEM Query:

Example: search for 'AMS' AND 'PING' AND 'debugger' in application logs, filtering for anomalous patterns.

🔗 References

📤 Share & Export