CVE-2022-46387

9.8 CRITICAL

📋 TL;DR

This vulnerability in ConEmu and Cmder terminal emulators allows attackers to inject malicious commands by manipulating the terminal title with control characters. When exploited, it enables arbitrary command execution with the privileges of the terminal user. Users of vulnerable ConEmu (through 220807) and Cmder (before 1.3.21) versions are affected.

💻 Affected Systems

Products:
  • ConEmu
  • Cmder
Versions: ConEmu through 220807, Cmder before 1.3.21
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations. Requires user interaction (viewing malicious content or connecting to malicious server) to trigger.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary command execution leading to privilege escalation, data exfiltration, ransomware deployment, or complete system takeover.

🟠

Likely Case

Local privilege escalation, credential theft, lateral movement within network, and installation of persistent backdoors.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege principles, and endpoint protection that blocks suspicious terminal commands.

🌐 Internet-Facing: LOW - This primarily requires local access or social engineering to trigger, not directly exploitable over internet.
🏢 Internal Only: HIGH - Significant risk in internal environments where users run vulnerable terminals, especially with elevated privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user to view malicious content or connect to malicious server. Proof-of-concept available in public gists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ConEmu after 220807, Cmder 1.3.21 and later

Vendor Advisory: https://github.com/cmderdev/cmder/blob/master/CHANGELOG.md

Restart Required: Yes

Instructions:

1. Update ConEmu to version after 220807. 2. Update Cmder to version 1.3.21 or later. 3. Restart terminal applications after update.

🔧 Temporary Workarounds

Disable Title Reporting

windows

Prevent terminal from reporting title information that could contain malicious control characters

Set ConEmu setting: Settings > Features > ANSI X3.64 and xterm sequences > Disable 'Process ANSI'

Use Alternative Terminal

windows

Temporarily switch to non-vulnerable terminal emulator like Windows Terminal or PowerShell

🧯 If You Can't Patch

  • Implement application allowlisting to block execution of unauthorized terminal applications
  • Enforce least privilege principles - ensure users run terminals with minimal necessary permissions

🔍 How to Verify

Check if Vulnerable:

Check ConEmu version (Help > About) is 220807 or earlier, or Cmder version (cmder.exe /ver) is before 1.3.21

Check Version:

ConEmu: Help > About dialog; Cmder: cmder.exe /ver or check CHANGELOG.md

Verify Fix Applied:

Confirm ConEmu version is after 220807 or Cmder version is 1.3.21 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual terminal title changes containing control characters
  • Suspicious command execution from terminal processes

Network Indicators:

  • Connections to suspicious servers followed by unusual terminal activity

SIEM Query:

Process Creation where (Image contains 'conemu' OR Image contains 'cmder') AND CommandLine contains unusual control characters

🔗 References

📤 Share & Export