CVE-2023-22497

CVSS V2 None CVSS V3 None
Description
Netdata is an open source option for real-time infrastructure monitoring and troubleshooting. Each Netdata Agent has an automatically generated MACHINE GUID. It is generated when the agent first starts and it is saved to disk, so that it will persist across restarts and reboots. Anyone who has access to a Netdata Agent has access to its MACHINE_GUID. Streaming is a feature that allows a Netdata Agent to act as parent for other Netdata Agents (children), offloading children from various functions (increased data retention, ML, health monitoring, etc) that can now be handled by the parent Agent. Configuration is done via `stream.conf`. On the parent side, users configure in `stream.conf` an API key (any random UUID can do) to provide common configuration for all children using this API key and per MACHINE GUID configuration to customize the configuration for each child. The way this was implemented, allowed an attacker to use a valid MACHINE_GUID as an API key. This affects all users who expose their Netdata Agents (children) to non-trusted users and they also expose to the same users Netdata Agent parents that aggregate data from all these children. The problem has been fixed in: Netdata agent v1.37 (stable) and Netdata agent v1.36.0-409 (nightly). As a workaround, do not enable streaming by default. If you have previously enabled this, it can be disabled. Limiting access to the port on the recipient Agent to trusted child connections may mitigate the impact of this vulnerability.
Overview
  • CVE ID
  • CVE-2023-22497
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-14T02:15:10
  • Last Modified Date
  • 2023-01-24T17:35:46
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:netdata:netdata:*:*:*:*:*:*:*:* 1 OR 1.37.0
History
Created Old Value New Value Data Type Notes
2023-01-14 04:15:10 Added to TrackCVE
2023-01-14 04:15:12 Weakness Enumeration new
2023-01-17 14:14:52 2023-01-17T13:24:56 CVE Modified Date updated
2023-01-17 14:14:52 Received Awaiting Analysis Vulnerability Status updated
2023-01-20 18:13:02 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-24 18:12:43 2023-01-24T17:35:46 CVE Modified Date updated
2023-01-24 18:12:43 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-24 18:12:45 Weakness Enumeration update
2023-01-24 18:12:46 CPE Information updated