Vulnerability Details : CVE-2022-32268
StarWind SAN and NAS v0.2 build 1914 allow remote code execution. A flaw was found in REST API in StarWind Stack. REST command, which allows changing the hostname, doesn’t check a new hostname parameter. It goes directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges.
Vulnerability category: Execute code
Products affected by CVE-2022-32268
- cpe:2.3:a:starwindsoftware:starwind_san_\&_nas:0.2:build_1914:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-32268
3.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-32268
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2022-32268
-
https://www.starwindsoftware.com/security/sw-20220531-0001/
CVE-2022-32268 Remote code execution in StarWind productsVendor Advisory
Jump to