Saturday, April 5, 2025
HomeCyber Security NewsOver 6000 Internet-Exposed Cacti Servers are Unpatched for Critical Security Vulnerability

Over 6000 Internet-Exposed Cacti Servers are Unpatched for Critical Security Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

A significant number of servers that use the Cacti software, and are connected to the internet, have not been updated to fix a security vulnerability that is currently being actively exploited by attackers.

According to Censys, a platform for managing attack surfaces, only a small fraction of the total number of Cacti servers that are connected to the internet have been updated to a version of the software that includes a patch for the critical security vulnerability that is currently being exploited. 

Out of a total of 6,427 servers, only 26 were found to have the updated version of Cacti, version 1.2.23 and 1.3.0, installed. The implication is that the majority of the servers were not running the patched version of the software, which could be a security concern.

The vulnerability being discussed, CVE-2022-46169, is a severe security issue that allows an unauthorized individual to execute arbitrary code on systems using an affected version of Cacti. 

It is a combination of two types of attack, an authentication bypass, and a command injection vulnerability, which together result in a CVSS score of 9.8. This open-source, web-based monitoring solution is currently being actively exploited in the wild.

In the beginning, SonarSource identified this vulnerability, which affects all versions of the software that are 1.2.22 and earlier. 

The company took the responsible step of disclosing this information to the maintainers of the project on December 2, 2022, meaning that the individuals or teams responsible for maintaining and updating the project were made aware of the issue. 

This is an important step in addressing and mitigating the vulnerability, as it allows maintainers to take appropriate action, such as releasing a patch or update to fix the issue.

This vulnerability exists in most installations of Cacti due to the improper implementation of hostname-based authorization check, allowing unsanitized user input to potentially execute external commands.

The vulnerability has been made public, which has led to attempts to exploit it, with the Shadowserver Foundation and GreyNoise reporting that malicious attacks have been observed from one IP address located in Ukraine.

This video shows how a server that has a vulnerable version of Cacti can be exploited.

Countries where a Large number of Unpatched Servers are Located

Most of the unpatched versions (1,320) are found in these locations:-

  • Brazil
  • Indonesia
  • The U.S.
  • China
  • Bangladesh
  • Russia
  • Ukraine
  • The Philippines
  • Thailand
  • The U.K.

The security vulnerability in Cacti allows an unauthenticated attacker to bypass the authentication process by accessing a specific file, this is done by exploiting a defect in the software that allows improper sanitization of an argument during the processing of a specific HTTP query that is related to a polling “action” defined in the database. This way attackers can gain unauthorized access to the system.

Monitors are monitored by whom?

Cacti is just one example of a type of software that is used to monitor the performance of a set of services or a network, there are many other similar tools. These monitoring tools are attractive targets for attackers since they contain valuable data. 

Even if a particular monitoring software like Cacti doesn’t have a known vulnerability, it is still not recommended to leave them exposed on the internet if they don’t have to be, because they could be used to gather intelligence about an organization by attackers.

It’s a common practice for cybercriminals to take advantage of newly discovered vulnerabilities to launch attacks, hence it is crucial for users to act fast and fix the security weaknesses as soon as possible before the attackers have a chance to exploit them.

Network Security Checklist – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...