7.2
CVSSv2

CVE-2022-0997

Published: 17/05/2022 Updated: 26/05/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Improper file permissions in the CommandPost, Collector, and Sensor components of Fidelis Network and Deception enables an attacker with local, administrative access to the CLI to modify affected script files, which could result in arbitrary commands being run as root upon subsequent logon by a root user. The vulnerability is present in Fidelis Network and Deception versions before 9.4.5. Patches and updates are available to address this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fidelissecurity deception

fidelissecurity network

Github Repositories

Fidelis Network and Deception - Insecure File Permissions Privilege Escalation

Fidelis Network and Deception - CVE-2022-0997 - Insecure File Permissions Privilege Escalation Releasability and Acknowledgements The exploit was approved for public release by the United States Government Special thanks to the servicemen and government liaisons tasked with approving the documentation for unlimited distribution Please refer to the following OTR numbers: OTR-