CVE-2022-26067
Open Automation Software vulnerability analysis and mitigation

Overview

An information disclosure vulnerability exists in the OAS Engine SecureTransferFiles functionality of Open Automation Software (OAS) Platform V16.00.0112. The vulnerability, identified as CVE-2022-26067, was discovered by Jared Rittle of Cisco Talos and publicly disclosed on May 25, 2022. The vulnerability allows an attacker to perform arbitrary file reads through a specially-crafted series of network requests (Talos Report).

Technical details

The vulnerability has a CVSSv3 score of 4.9 (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) and is classified under CWE-306 (Missing Authentication for Critical Function). The vulnerability exists in the SecureTransferFiles functionality, which operates on TCP port 58727 by default. Exploitation requires the existence of a Security Group with File Transfer permissions and a User Account in that group within the OAS Platform. The credentials can either be sniffed from the network if they exist or need to be created before exploitation is possible (Talos Report).

Impact

If successfully exploited, this vulnerability allows an attacker to read arbitrary files at any location permissible by the underlying user running the OAS-engine service. The platform typically runs under the 'oasuser' account with normal user permissions, potentially exposing sensitive system files to unauthorized access (Talos Report, Threatpost).

Mitigation and workarounds

The primary mitigation strategy is to prevent access to the configuration port (TCP/58727 by default) when not actively configuring the OAS Platform. Additionally, it is recommended to use a dedicated user account with minimal necessary permissions to run the OAS Platform. Users are encouraged to update to versions newer than V16.00.0112. Proper network segmentation should be implemented to ensure adversaries have the lowest possible level of access to the network on which the OAS Platform communicates (Talos Report).

Additional resources


SourceThis report was generated using AI

Related Open Automation Software vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-34998HIGH8.1
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34353HIGH7.5
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34317MEDIUM6.5
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-35124MEDIUM4.3
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34994MEDIUM4.3
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management