CVE-2022-44877, critical RCE in CentOS Control Web Panel exploited in the wild: everything you need to know

Detect and mitigate CVE-2022-44877, a CentOS Control Web Panel (CWP) unauthenticated RCE exploited in the wild. Security teams are advised to patch urgently.

1 분 읽기

CVE-2022-44877, a critical RCE vulnerability in Control Web Panel 7 (also known as CentOS Web Panel), has been reportedly exploited in the wild. The vulnerability could allow an unauthenticated attacker to escalate privileges and execute code remotely on susceptible servers. Although the vulnerability was published and assigned a CVE on January 6, a fix has been available since October 25, 2022. It was assigned a CVSS score of 9.8.

Exploitation attempts reportedly began around January 6, closely following the publication of a public proof of concept.

What is CVE-2022-44877? 

In unpatched versions of CWP, there is a flaw that allows the execution of Bash commands if double quotation marks are used when logging incorrect entries into the system. This flaw could enable an attacker to execute commands remotely on a machine running a vulnerable version of CWP, with the same privilege level as CWP, which in many cases is root by default. This is the third critical vulnerability in CWP published in the past 30 days, along with CVE-2021-45467 and CVE-2021-45466.

Wiz Research data: what is the risk to cloud environments?

According to Wiz data, CWP is not prevalent in cloud environments and therefore there is a lower risk of CVE-2022-44877 exploitation in such environmets.

What sort of exploitation has been identified in the wild?

Since the publication of the proof of concept on January 6, mass exploitation attempts have been observed in the wild.

Indicators of compromise

Researchers observed the following IP addresses in attempted exploitations: 

  • 206.189.170.136 

  • 185.117.73.208

  • 157.230.62.113 

  • 180.183.132.35 

Which products are affected?

Versions of CentOS Control Web Panel prior to version 0.9.8.1147

Which actions should security teams take?

It is highly recommended to update instances of CWP to the patched version 0.9.8.1147, or later. In addition, monitor if your environments have been accessed by any above known malicious IP address.

Wiz customers can use the pre-built query and advisory in the Wiz Threat Center to search for vulnerable instances in their environment.

References 

계속 읽기

The State of the Cloud 2023

Wiz's State of the Cloud 2023 report provides analysis of trends in cloud usage such as multi-cloud, use of managed services and more. In addition, the report highlights notable cloud risks based on insights from 30% of Fortune 100 enterprise cloud environments

맞춤형 데모 받기

맞춤형 데모 신청하기

“내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다.”
데이비드 에슬릭최고정보책임자(CISO)
“Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다.”
아담 플레처최고 보안 책임자(CSO)
“우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다.”
그렉 포니아토프스키위협 및 취약성 관리 책임자