Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.MOBATEK_MOBAXTERM_CVE-2022-38337.NASL
HistoryMar 15, 2024 - 12:00 a.m.

Mobatek MobaXterm < 22.3 (CVE-2022-38337)

2024-03-1500:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
16
mobatek mobaxterm
version 22.3
vulnerability
cve-2022-38337
sftp connection
denial of service
fail2ban

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

7.2 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

59.3%

The version of Mobatek MobaXterm installed on the remote host is prior to 22.3. It is, therefore, affected by a vulnerability as referenced in the CVE-2022-38337 advisory.

  • When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user if services like fail2ban are used. (CVE-2022-38337)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(192156);
  script_version("1.0");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/15");

  script_cve_id("CVE-2022-38337");

  script_name(english:"Mobatek MobaXterm < 22.3 (CVE-2022-38337)");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a security update.");
  script_set_attribute(attribute:"description", value:
"The version of Mobatek MobaXterm installed on the remote host is prior to 22.3. It is, therefore, affected by a
vulnerability as referenced in the CVE-2022-38337 advisory.

  - When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The
    server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user
    if services like fail2ban are used. (CVE-2022-38337)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  # https://www.cvedetails.com/vulnerability-list/vendor_id-15701/product_id-32575/Mobatek-Mobaxterm.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f7905d11");
  script_set_attribute(attribute:"see_also", value:"https://www.cvedetails.com/cve/CVE-2022-38337");
  script_set_attribute(attribute:"solution", value:
"Upgrade Mobatek MobaXterm based upon the guidance specified in the linked advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-38337");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/12/06");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/12/06");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/03/15");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:mobatek:mobaxterm");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("mobatek_mobaxterm_win_installed.nbin");
  script_require_keys("installed_sw/Mobatek MobaXterm");

  exit(0);
}

include('vcf.inc');
get_kb_item_or_exit('SMB/Registry/Enumerated');

var app_info = vcf::get_app_info(app:'Mobatek MobaXterm', win_local:TRUE);

var constraints = [
  { 'fixed_version' : '22.3' }
];

vcf::check_version_and_report(
    app_info:app_info,
    constraints:constraints,
    severity:SECURITY_HOLE
);
VendorProductVersionCPE
mobatekmobaxtermcpe:/a:mobatek:mobaxterm

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

7.2 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

59.3%

Related for MOBATEK_MOBAXTERM_CVE-2022-38337.NASL