PT-2023-18548 · Netdata +4 · Netdata +4
Ralphm
·
Published
2023-01-14
·
Updated
2025-02-03
·
CVE-2023-22497
9.1
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
Name of the Vulnerable Software and Affected Versions:
Netdata agent versions prior to 1.37
Netdata agent versions prior to 1.36.0-409 (nightly)
Description:
The issue affects Netdata Agents that expose their services to non-trusted users, particularly when the streaming feature is enabled, allowing a parent Netdata Agent to handle functions for its children. An attacker can exploit this by using a valid MACHINE GUID as an API key. This can lead to unauthorized access and potential data manipulation. The estimated number of potentially affected devices is not specified.
Recommendations:
For Netdata agent versions prior to 1.37, update to version 1.37 or later.
For Netdata agent versions prior to 1.36.0-409 (nightly), update to version 1.36.0-409 (nightly) or later.
As a temporary workaround, consider disabling the streaming feature by default or limiting access to the port on the recipient Agent to trusted child connections.
Exploit
Fix
Improper Authentication
Exposure of Resource to Wrong Sphere
Related Identifiers
Affected Products
References · 35
- 🔥 https://github.com/netdata/netdata/security/advisories/GHSA-jx85-39cw-66f2⭐ 74043 🔗 6039 · Exploit
- https://ubuntu.com/security/CVE-2023-22497 · Vendor Advisory
- https://osv.dev/vulnerability/UBUNTU-CVE-2023-22497 · Vendor Advisory
- https://ubuntu.com/security/CVE-2018-18837 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-22497 · Security Note
- https://cve.org/CVERecord?id=CVE-2023-22497 · Security Note
- https://security-tracker.debian.org/tracker/CVE-2023-22497 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22497 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18837 · Security Note
- https://ubuntu.com/security/notices/USN-7250-1 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-34250 · Vendor Advisory
- https://security-tracker.debian.org/tracker/source-package/netdata · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2023-1223 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2023-22497 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-34251 · Vendor Advisory