Saturday, June 15, 2024

Over 6000 Internet-Exposed Cacti Servers are Unpatched for Critical Security Vulnerability

A significant number of servers that use the Cacti software, and are connected to the internet, have not been updated to fix a security vulnerability that is currently being actively exploited by attackers.

According to Censys, a platform for managing attack surfaces, only a small fraction of the total number of Cacti servers that are connected to the internet have been updated to a version of the software that includes a patch for the critical security vulnerability that is currently being exploited. 

Out of a total of 6,427 servers, only 26 were found to have the updated version of Cacti, version 1.2.23 and 1.3.0, installed. The implication is that the majority of the servers were not running the patched version of the software, which could be a security concern.

The vulnerability being discussed, CVE-2022-46169, is a severe security issue that allows an unauthorized individual to execute arbitrary code on systems using an affected version of Cacti. 

It is a combination of two types of attack, an authentication bypass, and a command injection vulnerability, which together result in a CVSS score of 9.8. This open-source, web-based monitoring solution is currently being actively exploited in the wild.

In the beginning, SonarSource identified this vulnerability, which affects all versions of the software that are 1.2.22 and earlier. 

The company took the responsible step of disclosing this information to the maintainers of the project on December 2, 2022, meaning that the individuals or teams responsible for maintaining and updating the project were made aware of the issue. 

This is an important step in addressing and mitigating the vulnerability, as it allows maintainers to take appropriate action, such as releasing a patch or update to fix the issue.

This vulnerability exists in most installations of Cacti due to the improper implementation of hostname-based authorization check, allowing unsanitized user input to potentially execute external commands.

The vulnerability has been made public, which has led to attempts to exploit it, with the Shadowserver Foundation and GreyNoise reporting that malicious attacks have been observed from one IP address located in Ukraine.

This video shows how a server that has a vulnerable version of Cacti can be exploited.

Countries where a Large number of Unpatched Servers are Located

Most of the unpatched versions (1,320) are found in these locations:-

  • Brazil
  • Indonesia
  • The U.S.
  • China
  • Bangladesh
  • Russia
  • Ukraine
  • The Philippines
  • Thailand
  • The U.K.

The security vulnerability in Cacti allows an unauthenticated attacker to bypass the authentication process by accessing a specific file, this is done by exploiting a defect in the software that allows improper sanitization of an argument during the processing of a specific HTTP query that is related to a polling “action” defined in the database. This way attackers can gain unauthorized access to the system.

Monitors are monitored by whom?

Cacti is just one example of a type of software that is used to monitor the performance of a set of services or a network, there are many other similar tools. These monitoring tools are attractive targets for attackers since they contain valuable data. 

Even if a particular monitoring software like Cacti doesn’t have a known vulnerability, it is still not recommended to leave them exposed on the internet if they don’t have to be, because they could be used to gather intelligence about an organization by attackers.

It’s a common practice for cybercriminals to take advantage of newly discovered vulnerabilities to launch attacks, hence it is crucial for users to act fast and fix the security weaknesses as soon as possible before the attackers have a chance to exploit them.

Network Security Checklist – Download Free E-Book


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles