1 min read

Mitigation Instructions for CVE-2022-36446

Mitigation Instructions for CVE-2022-36446

SUBJECT: CVE-2022-36446 MiniServ 1.973 (Webmin 1.973) Vulnerability

TECH STACK: MiniServ 1.973 (Webmin 1.973)

DATE(S) ISSUED: 07/25/2022

CRITICALITY: HIGH 


OVERVIEW:

CVE-2022-36446 is a critical vulnerability in MiniServ 1.973, which is a component of Webmin 1.973. This vulnerability allows an attacker to exploit an open port (39993) to gain unauthorized access and potentially execute arbitrary code. Exploiting this vulnerability can lead to a complete compromise of the affected system.

NIST Description: The vulnerability in MiniServ 1.973 of Webmin 1.973 allows attackers to exploit an open port (39993) to bypass authentication and gain unauthorized access. This issue can result in significant security breaches, including unauthorized data access and potential system takeover.

For more details, visit NVD.

THREAT INTELLIGENCE:

CISA has added CVE-2022-36446 to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation by threat actors. This vulnerability is a common attack vector for malicious cyber actors, posing a high risk to systems running the affected software.

For more information, visit CISA.

NIST NVD:

  • Base Score: 9.8

SOLUTION:

The patch for CVE-2022-36446 has been released and should be applied immediately to mitigate the risk. The update addresses the vulnerability in MiniServ 1.973 of Webmin 1.973.

Steps to Mitigate the Vulnerability:

  1. Download the latest version of Webmin from the Webmin website.
  2. Stop the Webmin service.
  3. Back Up your Webmin configuration and data.
  4. Install the updated version of Webmin following the instructions provided in the Webmin documentation.
  5. Start the Webmin service.

Mitigation Measures:

  • Firewall Configuration: Ensure that port 39993 is not accessible from untrusted networks. Use firewall rules to restrict access to trusted IP addresses only.
  • Reverse Proxy: Implement a reverse proxy to block unauthorized access to the affected port and paths.

REFERENCES:

 

Mitigation Instructions for Apache HTTP Server versions 2.1.x to 2.2.x

Mitigation Instructions for Apache HTTP Server versions 2.1.x to 2.2.x

SUBJECT: Unsupported Version of Apache HTTP Server Detection

Read More
Mitigation Instructions for Microsoft-IIS 7.0 Unsupported Web Server Detection

Mitigation Instructions for Microsoft-IIS 7.0 Unsupported Web Server Detection

SUBJECT: Microsoft-IIS/7.0 Unsupported Web Server Detection

Read More
Mitigation Instructions for CVE-2024-4577

Mitigation Instructions for CVE-2024-4577

SUBJECT: CVE-2024-4577 PHP-CGI Argument Injection Vulnerability

Read More