7.3 CVE-2022-4987

Enriched by CISA
 

Hirschmann Industrial HiVision version 08.1.03 prior to 08.1.04 and 08.2.00 contains a vulnerability in the execution of user-configured external applications that allows a local attacker to execute arbitrary binaries. Due to insufficient path sanitization, an attacker can place a malicious binary in the execution path of a configured external application, causing it to be executed instead of the intended application. This can result in execution with elevated privileges depending on the context of the external application.
https://nvd.nist.gov/vuln/detail/CVE-2022-4987

Categories

CWE-426 : Untrusted Search Path

References


 

AFFECTED (from MITRE)


Vendor Product Versions
Belden Hirschmann Industrial HiVision
  • ≤ 08.1.03 [affected]
  • 08.2.00 [unaffected]
  • 08.1.04 [unaffected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
38 Leveraging/Manipulating Configuration File Search Paths
Very High


MITRE


Techniques

id description
T1574.007 Hijack Execution Flow:Path Interception by PATH Environment Variable
T1574.009 Hijack Execution Flow: Path Interception by Unquoted Path
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1022 Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories.
M1022 Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.