Cacti Crisis: Severe Vulnerability Exploited in the Wild

16 January 2023 [NO.TCSA : 20230116-1-1-P]

PUBLISHED:
16 January 2023

Cacti Crisis: Severe Vulnerability Exploited in the Wild

A severe vulnerability in the Cacti open-source web-based monitoring solution, identified as CVE-2022-46169 with a CVSS score of 9.8, is being actively exploited in the wild. The vulnerability, which is a combination of authentication bypass and command injection, allows an unauthenticated user to execute arbitrary code on affected versions of the software. A significant number of internet-exposed Cacti servers have been found to be vulnerable to this exploit.

Affected Versions

  • Cacti versions 1.2.22 and below 

Mitigation

Users are strongly advised to test and upgrade to Cacti version 1.2.23 or 1.3.0 (or later), which have been patched to address this vulnerability. Additionally, it is recommended to regularly monitor the security of your systems and to apply security updates as soon as they become available.

More Information

 

9 February 2024 [NO.TCSA : 20240209-1-1-P]

Critical Remote Code Execution Vulnerability Found in FortiOS SSL VPN

READ MORE READ MORE
13 July 2023 [NO.TCSA : 20230713-1-1-P]

Fortinet Patches Critical Remote Code Execution Vulnerability in FortiOS/FortiProxy

READ MORE READ MORE
23 June 2023 [NO.TCSA : 20230623-1-1-P]

WSO2 Releases Patches for Vulnerabilities in API Manager, Identity Server, and Other Products

READ MORE READ MORE
Read More BACK TO THREAT BULLETIN