Over 6000 Internet-Exposed Cacti Servers are Unpatched for Critical Security Vulnerability

A significant number of servers that use the Cacti software, and are connected to the internet, have not been updated to fix a security vulnerability that is currently being actively exploited by attackers.

According to Censys, a platform for managing attack surfaces, only a small fraction of the total number of Cacti servers that are connected to the internet have been updated to a version of the software that includes a patch for the critical security vulnerability that is currently being exploited. 

Out of a total of 6,427 servers, only 26 were found to have the updated version of Cacti, version 1.2.23 and 1.3.0, installed. The implication is that the majority of the servers were not running the patched version of the software, which could be a security concern.

The vulnerability being discussed, CVE-2022-46169, is a severe security issue that allows an unauthorized individual to execute arbitrary code on systems using an affected version of Cacti. 

It is a combination of two types of attack, an authentication bypass, and a command injection vulnerability, which together result in a CVSS score of 9.8. This open-source, web-based monitoring solution is currently being actively exploited in the wild.

In the beginning, SonarSource identified this vulnerability, which affects all versions of the software that are 1.2.22 and earlier. 

The company took the responsible step of disclosing this information to the maintainers of the project on December 2, 2022, meaning that the individuals or teams responsible for maintaining and updating the project were made aware of the issue. 

This is an important step in addressing and mitigating the vulnerability, as it allows maintainers to take appropriate action, such as releasing a patch or update to fix the issue.

This vulnerability exists in most installations of Cacti due to the improper implementation of hostname-based authorization check, allowing unsanitized user input to potentially execute external commands.

The vulnerability has been made public, which has led to attempts to exploit it, with the Shadowserver Foundation and GreyNoise reporting that malicious attacks have been observed from one IP address located in Ukraine.

This video shows how a server that has a vulnerable version of Cacti can be exploited.

Countries where a Large number of Unpatched Servers are Located

Most of the unpatched versions (1,320) are found in these locations:-

  • Brazil
  • Indonesia
  • The U.S.
  • China
  • Bangladesh
  • Russia
  • Ukraine
  • The Philippines
  • Thailand
  • The U.K.

The security vulnerability in Cacti allows an unauthenticated attacker to bypass the authentication process by accessing a specific file, this is done by exploiting a defect in the software that allows improper sanitization of an argument during the processing of a specific HTTP query that is related to a polling “action” defined in the database. This way attackers can gain unauthorized access to the system.

Monitors are monitored by whom?

Cacti is just one example of a type of software that is used to monitor the performance of a set of services or a network, there are many other similar tools. These monitoring tools are attractive targets for attackers since they contain valuable data. 

Even if a particular monitoring software like Cacti doesn’t have a known vulnerability, it is still not recommended to leave them exposed on the internet if they don’t have to be, because they could be used to gather intelligence about an organization by attackers.

It’s a common practice for cybercriminals to take advantage of newly discovered vulnerabilities to launch attacks, hence it is crucial for users to act fast and fix the security weaknesses as soon as possible before the attackers have a chance to exploit them.

Network Security Checklist – Download Free E-Book

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

2 days ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

3 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

4 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

4 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

4 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

4 days ago