Cacti Command Injection Vulnerability
Critical vulnerability exploited in the wild
https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
In affected versions of Cacti v1.2.22, a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti. Gaining access to the Cacti instance of an organization could give attackers with the opportunity to learn about the types of devices on the network and their local IP addresses.
Background
Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users.
Announced
December 5, 2022: The patch was released in version 1.2.23 and 1.3.0 on
Latest Developments
February 16, 2023: CISA released advisory and has added CVE-202246169 to its list of known exploited vulnerability (KEV). FortiGuard Labs has already released an IPS signature, in January, to detect and block such attacks and also recommends Cacti admins to patch the vulnerable Cacti versions to 1.2.23, 1.3.0 and above.
arrow_icon
PROTECT

Countermeasures across the security fabric for protecting assets, data and network from cybersecurity events:

Reconnaissance
Weaponization
Delivery

Exploitation

IPS

Detects and Blocks attack attempts related to Cacti Vulnerability (CVE-2022-46169)

DB 22.468
DB 22.468
DB 22.468
DB 22.468
DB 22.468
Web App Security

Detects and Blocks attack attempts related to Cacti Vulnerability (CVE-2022-46169)

DB 0.00345
Application Firewall

Detects and Blocks attack attempts related to Cacti Vulnerability (CVE-2022-46169)

DB 22.468
Installation
C2
Action
arrow_icon
DETECT

Find and correlate important information to identify an outbreak, the following updates are available to raise alert and generate reports:

Outbreak Detection

DB 1.006
DB 1.00088
IOC

DB 0.02466
DB 0.02466
DB 0.02466
Threat Hunting
Content Update

DB 404
arrow_icon
RESPOND

Develop containment techniques to mitigate impacts of security events:

Automated Response

Services that can automaticlly respond to this outbreak.

Assisted Response Services

Experts to assist you with analysis, containment and response activities.

arrow_icon
RECOVER

Improve security posture and processes by implementing security awareness and training, in preparation for (and recovery from) security incidents:

InfoSec Services

Security readiness and awareness training for SOC teams, InfoSec and general employees.

arrow_icon
IDENTIFY

Identify processes and assets that need protection:

Attack Surface Monitoring (Inside & Outside)

Security reconnaissance and penetration testing services, covering both internal & external attack vectors, including those introduced internally via software supply chain.