CVE-2022-44877, critical RCE in CentOS Control Web Panel exploited in the wild: everything you need to know

Detect and mitigate CVE-2022-44877, a CentOS Control Web Panel (CWP) unauthenticated RCE exploited in the wild. Security teams are advised to patch urgently.

1 minutes read

CVE-2022-44877, a critical RCE vulnerability in Control Web Panel 7 (also known as CentOS Web Panel), has been reportedly exploited in the wild. The vulnerability could allow an unauthenticated attacker to escalate privileges and execute code remotely on susceptible servers. Although the vulnerability was published and assigned a CVE on January 6, a fix has been available since October 25, 2022. It was assigned a CVSS score of 9.8.

Exploitation attempts reportedly began around January 6, closely following the publication of a public proof of concept.

What is CVE-2022-44877? 

In unpatched versions of CWP, there is a flaw that allows the execution of Bash commands if double quotation marks are used when logging incorrect entries into the system. This flaw could enable an attacker to execute commands remotely on a machine running a vulnerable version of CWP, with the same privilege level as CWP, which in many cases is root by default. This is the third critical vulnerability in CWP published in the past 30 days, along with CVE-2021-45467 and CVE-2021-45466.

Wiz Research data: what is the risk to cloud environments?

According to Wiz data, CWP is not prevalent in cloud environments and therefore there is a lower risk of CVE-2022-44877 exploitation in such environmets.

What sort of exploitation has been identified in the wild?

Since the publication of the proof of concept on January 6, mass exploitation attempts have been observed in the wild.

Indicators of compromise

Researchers observed the following IP addresses in attempted exploitations: 

  • 206.189.170.136 

  • 185.117.73.208

  • 157.230.62.113 

  • 180.183.132.35 

Which products are affected?

Versions of CentOS Control Web Panel prior to version 0.9.8.1147

Which actions should security teams take?

It is highly recommended to update instances of CWP to the patched version 0.9.8.1147, or later. In addition, monitor if your environments have been accessed by any above known malicious IP address.

Wiz customers can use the pre-built query and advisory in the Wiz Threat Center to search for vulnerable instances in their environment.

References 

Continue reading

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management