NA

CVE-2022-40022

Published: 13/02/2023 Updated: 14/06/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Microchip Technology (Microsemi) SyncServer S650 exists to contain a command injection vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microchip syncserver_s650_firmware -

Exploits

This Metasploit module exploits an unauthenticated command injection vulnerability in /controller/pingphp in Symmetricom SyncServer The S100 through S350 (End of Life) models should be vulnerable to unauthenticated exploitation due to a session handling vulnerability ...
This module exploits an unauthenticated command injection vulnerability in /controller/pingphp The S100 through S350 (End of Life) models should be vulnerable to unauthenticated exploitation due to a session handling vulnerability Later models require authentication which is not provided in this module because we ca ...

Metasploit Modules

Symmetricom SyncServer Unauthenticated Remote Command Execution

This module exploits an unauthenticated command injection vulnerability in /controller/ping.php. The S100 through S350 (End of Life) models should be vulnerable to unauthenticated exploitation due to a session handling vulnerability. Later models require authentication which is not provided in this module because we can't test it. The command injection vulnerability is patched in the S650 v2.2 (CVE-2022-40022). Run 'check' first to determine if vulnerable. The server limits outbound ports. Ports 25 and 80 TCP were successfully used for SRVPORT and LPORT while testing this module.

msf > use exploit/linux/http/symmetricom_syncserver_rce
msf exploit(symmetricom_syncserver_rce) > show targets
    ...targets...
msf exploit(symmetricom_syncserver_rce) > set TARGET < target-id >
msf exploit(symmetricom_syncserver_rce) > show options
    ...show and set options...
msf exploit(symmetricom_syncserver_rce) > exploit