CVE-2022-50927

6.2 MEDIUM

📋 TL;DR

CVE-2022-50927 is a local privilege escalation vulnerability in Cyclades Serial Console Server version 3.3.0. Attackers with local access can exploit overly permissive sudo privileges for the admin user/group to gain root access by manipulating system binaries. Organizations using Cyclades Serial Console Server 3.3.0 are affected.

💻 Affected Systems

Products:
  • Cyclades Serial Console Server
Versions: 3.3.0
Operating Systems: Linux-based embedded OS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration with admin user/group having overly permissive sudo privileges.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root access, allowing attackers to install persistent backdoors, exfiltrate all data, and pivot to other systems in the network.

🟠

Likely Case

Local attackers gain root privileges, enabling them to modify system configurations, access sensitive data, and maintain persistence on the compromised system.

🟢

If Mitigated

Limited impact if proper access controls, network segmentation, and least privilege principles are implemented to restrict local access.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local system access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any attacker with local access (including compromised user accounts or physical access) can exploit this to gain root privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access but is straightforward to execute once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.1 or later

Vendor Advisory: https://www.vertiv.com/en-us/

Restart Required: Yes

Instructions:

1. Check current version with 'cat /etc/version'. 2. Download and install version 3.3.1 or later from Vertiv support portal. 3. Reboot the system after installation.

🔧 Temporary Workarounds

Restrict sudo privileges

linux

Modify sudoers configuration to remove overly permissive privileges for admin user and admin group

visudo
Remove or restrict lines granting broad sudo permissions to admin user/group

Remove unnecessary sudo permissions

linux

Audit and remove sudo permissions that allow execution of system binaries with root privileges

grep -r 'admin' /etc/sudoers*
Remove any lines granting NOPASSWD or unrestricted sudo to admin

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local access to the console server
  • Monitor for suspicious sudo usage and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check sudoers configuration: 'sudo -l -U admin' and verify if admin has unrestricted sudo access to system binaries

Check Version:

cat /etc/version | grep -q '3.3.0' && echo 'Vulnerable' || echo 'Patched'

Verify Fix Applied:

Verify sudo permissions are restricted: 'sudo -l -U admin' should show limited or no sudo privileges

📡 Detection & Monitoring

Log Indicators:

  • Unusual sudo usage by admin user
  • Commands executed with sudo that are not typical for admin tasks
  • Multiple failed sudo attempts followed by successful privilege escalation

Network Indicators:

  • Unusual SSH or console connections to the serial console server

SIEM Query:

source="auth.log" AND (sudo OR su) AND user="admin" AND (command="/bin/*" OR command="/usr/bin/*")

🔗 References

📤 Share & Export