pfSense pfBlocker-NG - Remote Code Execution CVE-2022-31814
- Severity
- CVSSv3 Score
- 9.8
- Vulnerability description
pfSense is affected by a Remote Code Execution, located in the
/pfblockerng/www/index.php endpoint. The root cause of this vulnerability consists in insufficient sanitization in the Host header. This allows a malicious unauthenticated attacker to execute arbitrary code on the server through payloads sent in the Host header.
Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the pfSense server in order to steal confidential information, install ransomware or pivot to the internal network.
Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
Recommendation
Upgrade the pfBlocker-NG package to the latest version or to a version greater than 2.1.4_26.
References
https://nvd.nist.gov/vuln/detail/CVE-2022-31814https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31814
Codename
Not available
Detectable with
Network Scanner
Scan engine
Sniper
Exploitable with Sniper
Yes
CVE Published
May 9, 2021
Detection added at
Software Type
Firewall
Vendor
Rubicon Communications
Product
pfBlocker-NG Package