CVE-2022-47555
📋 TL;DR
This CVE describes an operating system command injection vulnerability in ekorCCP and ekorRCI software from Ormazabal. Authenticated attackers can execute arbitrary commands on affected systems, potentially creating new users with elevated privileges or establishing backdoors. Organizations using Ormazabal's ekorCCP or ekorRCI products are affected.
💻 Affected Systems
- ekorCCP
- ekorRCI
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to execute arbitrary commands as root/admin, create persistent backdoors, exfiltrate sensitive data, and pivot to other network systems.
Likely Case
Authenticated attacker gains command execution on affected systems, potentially creating unauthorized users, modifying configurations, or deploying malware.
If Mitigated
With proper network segmentation, strong authentication controls, and monitoring, impact limited to isolated system compromise with limited lateral movement.
🎯 Exploit Status
Command injection vulnerabilities typically have low exploitation complexity once authentication is obtained. No public exploit code identified in references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in provided references
Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ormazabal-products
Restart Required: Yes
Instructions:
1. Contact Ormazabal for specific patched versions. 2. Apply vendor-provided patches. 3. Restart affected services/systems. 4. Verify patch application.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected systems from untrusted networks and limit access to authorized users only.
Authentication Hardening
allImplement strong authentication mechanisms and regularly rotate credentials.
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach affected systems
- Enable detailed logging and monitoring for command execution attempts and user creation activities
🔍 How to Verify
Check if Vulnerable:
Check system version against vendor advisory. Look for ekorCCP or ekorRCI installations in your environment.
Check Version:
Vendor-specific command not provided. Check product documentation or contact Ormazabal.
Verify Fix Applied:
Verify patch version matches vendor recommendations. Test that command injection attempts are properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution patterns
- Unexpected user creation events
- Suspicious process execution from web interfaces
Network Indicators:
- Unusual outbound connections from affected systems
- Traffic to unexpected ports
SIEM Query:
source="ekor*" AND (event_type="command_execution" OR user_creation="true")