1 min read

Mitigation Instructions for CVE-2022-36446

Mitigation Instructions for CVE-2022-36446

SUBJECT: CVE-2022-36446 MiniServ 1.973 (Webmin 1.973) Vulnerability

TECH STACK: MiniServ 1.973 (Webmin 1.973)

DATE(S) ISSUED: 07/25/2022

CRITICALITY: HIGH 


OVERVIEW:

CVE-2022-36446 is a critical vulnerability in MiniServ 1.973, which is a component of Webmin 1.973. This vulnerability allows an attacker to exploit an open port (39993) to gain unauthorized access and potentially execute arbitrary code. Exploiting this vulnerability can lead to a complete compromise of the affected system.

NIST Description: The vulnerability in MiniServ 1.973 of Webmin 1.973 allows attackers to exploit an open port (39993) to bypass authentication and gain unauthorized access. This issue can result in significant security breaches, including unauthorized data access and potential system takeover.

For more details, visit NVD.

THREAT INTELLIGENCE:

CISA has added CVE-2022-36446 to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation by threat actors. This vulnerability is a common attack vector for malicious cyber actors, posing a high risk to systems running the affected software.

For more information, visit CISA.

NIST NVD:

  • Base Score: 9.8

SOLUTION:

The patch for CVE-2022-36446 has been released and should be applied immediately to mitigate the risk. The update addresses the vulnerability in MiniServ 1.973 of Webmin 1.973.

Steps to Mitigate the Vulnerability:

  1. Download the latest version of Webmin from the Webmin website.
  2. Stop the Webmin service.
  3. Back Up your Webmin configuration and data.
  4. Install the updated version of Webmin following the instructions provided in the Webmin documentation.
  5. Start the Webmin service.

Mitigation Measures:

  • Firewall Configuration: Ensure that port 39993 is not accessible from untrusted networks. Use firewall rules to restrict access to trusted IP addresses only.
  • Reverse Proxy: Implement a reverse proxy to block unauthorized access to the affected port and paths.

REFERENCES:

 

Mitigation Instructions for CVE-2016-4437

Mitigation Instructions for CVE-2016-4437

Mitigating CVE-2016-4437: Remote Code Execution Vulnerability in Apache ActiveMQ

Read More
Mitigation Instructions for CVE-2013-1896

Mitigation Instructions for CVE-2013-1896

Mitigating CVE-2013-1896: Privilege Escalation Vulnerability in Puppet

Read More
Mitigation Instructions for CVE-2014-6271 Shellshock Vulnerability in Bash

Mitigation Instructions for CVE-2014-6271 Shellshock Vulnerability in Bash

Subject: Mitigating CVE-2014-6271: Shellshock Vulnerability in Bash

Read More