Skip to main content

CVE-2022-0074: CWE-426 Untrusted Search Path in LiteSpeed Technologies OpenLiteSpeed Web Server

High
VulnerabilityCVE-2022-0074cvecve-2022-0074cwe-426
Published: Thu Oct 27 2022 (10/27/2022, 19:32:19 UTC)
Source: CVE
Vendor/Project: LiteSpeed Technologies
Product: OpenLiteSpeed Web Server

Description

Untrusted Search Path vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server Container allows Privilege Escalation. This affects versions from 1.6.15 before 1.7.16.1.

AI-Powered Analysis

AILast updated: 07/04/2025, 23:57:20 UTC

Technical Analysis

CVE-2022-0074 is a high-severity vulnerability classified under CWE-426 (Untrusted Search Path) affecting LiteSpeed Technologies' OpenLiteSpeed Web Server and LiteSpeed Web Server Container versions from 1.6.15 up to but not including 1.7.16.1. The vulnerability arises due to the web server's improper handling of executable search paths, allowing an attacker with limited privileges (PR:L) to escalate their privileges on the affected system. Specifically, the untrusted search path means that the server may execute malicious binaries placed in directories that are searched before the legitimate ones, leading to privilege escalation without requiring user interaction (UI:N). The CVSS 3.1 base score of 8.8 reflects the critical impact on confidentiality, integrity, and availability (all rated high), with network attack vector (AV:N), low attack complexity (AC:L), and no user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk because it can be exploited remotely by authenticated users to gain elevated privileges, potentially leading to full system compromise. The lack of patch links suggests that users must verify updates directly from LiteSpeed Technologies or their distribution channels to remediate this issue.

Potential Impact

For European organizations, this vulnerability presents a substantial risk, especially for those relying on OpenLiteSpeed Web Server for hosting web applications or services. Successful exploitation could allow attackers to escalate privileges from a low-privileged user to root or administrative levels, enabling unauthorized access to sensitive data, modification or deletion of critical files, and disruption of web services. This could lead to data breaches, service outages, and compliance violations under regulations such as GDPR. Given the network-exploitable nature and high impact on confidentiality, integrity, and availability, organizations face risks including data theft, defacement, ransomware deployment, or lateral movement within their networks. The vulnerability is particularly concerning for cloud-hosted environments and containerized deployments using the affected LiteSpeed Web Server Container, where privilege escalation can compromise entire container hosts or orchestrated clusters.

Mitigation Recommendations

European organizations should immediately verify their OpenLiteSpeed Web Server versions and upgrade to version 1.7.16.1 or later where the vulnerability is patched. In the absence of an official patch, organizations should implement strict path environment controls to ensure that the server only executes binaries from trusted directories. This includes sanitizing PATH variables, removing write permissions for unprivileged users on directories included in the search path, and employing application whitelisting where possible. Additionally, running the web server with the least privileges necessary and isolating it within containers or virtual machines can limit the blast radius of a potential exploit. Regular auditing of system binaries and monitoring for anomalous execution patterns or privilege escalations should be enforced. Network-level protections such as firewall rules restricting access to the management interfaces and multi-factor authentication for administrative access can further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2021-12-28T23:57:05.675Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd744a

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/4/2025, 11:57:20 PM

Last updated: 7/26/2025, 6:11:09 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats