CVE-2022-22128: Remote Code Execution in Tableau Server
Tableau discovered a path traversal vulnerability affecting Tableau Server Administration Agent’s internal file transfer service that could allow remote code execution.Tableau only supports product versions for 24 months after release. Older versions have reached their End of Life and are no longer supported. They are also not assessed for potential security issues and do not receive security updates.
AI Analysis
Technical Summary
CVE-2022-22128 is a critical remote code execution (RCE) vulnerability affecting Tableau Server, specifically within the Tableau Server Administration Agent's internal file transfer service. The vulnerability arises from a path traversal flaw (CWE-22) that allows an attacker to manipulate file paths and potentially execute arbitrary code on the server without authentication or user interaction. This flaw exists in multiple versions of Tableau Server, ranging from 2020.4.20 through 2022.1.4, all of which are still supported within Tableau's 24-month support lifecycle. The vulnerability has a CVSS v3.1 base score of 9.8, indicating a critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Exploitation could lead to full compromise of the affected server, impacting confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the high severity and ease of exploitation make this a significant threat. The vulnerability was publicly disclosed on October 17, 2022, and is tracked under CVE-2022-22128. Since Tableau Server is widely used for business intelligence and data visualization, a successful attack could expose sensitive organizational data and disrupt critical analytics operations.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. Tableau Server often hosts sensitive business intelligence data, including financial, operational, and customer information. A successful remote code execution attack could lead to unauthorized data access, data manipulation, or destruction, severely impacting data confidentiality and integrity. Additionally, attackers could disrupt availability by executing malicious payloads that degrade or disable Tableau Server functionality, affecting decision-making processes reliant on real-time analytics. Given the critical nature of this vulnerability and the lack of required authentication, attackers could exploit exposed Tableau Server instances remotely, increasing the risk of widespread compromise. This is particularly concerning for sectors such as finance, healthcare, manufacturing, and government agencies in Europe, where data protection regulations like GDPR impose strict requirements on data security and breach notifications. A breach could result in regulatory penalties, reputational damage, and operational disruptions.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Immediately identify and inventory all Tableau Server instances in their environment, including version numbers, to assess exposure. 2) Upgrade all affected Tableau Server versions to the latest patched release provided by Tableau, as the vendor's support policy covers only the last 24 months of versions. 3) If immediate patching is not feasible, implement network-level controls to restrict access to Tableau Server Administration Agent services, such as firewall rules limiting connections to trusted management networks only. 4) Monitor network traffic and server logs for unusual file access patterns or unauthorized attempts to exploit path traversal. 5) Employ application-layer security controls, including web application firewalls (WAFs), configured to detect and block path traversal attempts targeting Tableau Server. 6) Conduct regular vulnerability scans and penetration tests focusing on Tableau Server to detect potential exploitation attempts. 7) Establish incident response procedures specific to Tableau Server compromise scenarios to enable rapid containment and remediation. 8) Educate IT and security teams about the criticality of this vulnerability and the importance of timely patching and monitoring.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Switzerland
CVE-2022-22128: Remote Code Execution in Tableau Server
Description
Tableau discovered a path traversal vulnerability affecting Tableau Server Administration Agent’s internal file transfer service that could allow remote code execution.Tableau only supports product versions for 24 months after release. Older versions have reached their End of Life and are no longer supported. They are also not assessed for potential security issues and do not receive security updates.
AI-Powered Analysis
Technical Analysis
CVE-2022-22128 is a critical remote code execution (RCE) vulnerability affecting Tableau Server, specifically within the Tableau Server Administration Agent's internal file transfer service. The vulnerability arises from a path traversal flaw (CWE-22) that allows an attacker to manipulate file paths and potentially execute arbitrary code on the server without authentication or user interaction. This flaw exists in multiple versions of Tableau Server, ranging from 2020.4.20 through 2022.1.4, all of which are still supported within Tableau's 24-month support lifecycle. The vulnerability has a CVSS v3.1 base score of 9.8, indicating a critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Exploitation could lead to full compromise of the affected server, impacting confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the high severity and ease of exploitation make this a significant threat. The vulnerability was publicly disclosed on October 17, 2022, and is tracked under CVE-2022-22128. Since Tableau Server is widely used for business intelligence and data visualization, a successful attack could expose sensitive organizational data and disrupt critical analytics operations.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. Tableau Server often hosts sensitive business intelligence data, including financial, operational, and customer information. A successful remote code execution attack could lead to unauthorized data access, data manipulation, or destruction, severely impacting data confidentiality and integrity. Additionally, attackers could disrupt availability by executing malicious payloads that degrade or disable Tableau Server functionality, affecting decision-making processes reliant on real-time analytics. Given the critical nature of this vulnerability and the lack of required authentication, attackers could exploit exposed Tableau Server instances remotely, increasing the risk of widespread compromise. This is particularly concerning for sectors such as finance, healthcare, manufacturing, and government agencies in Europe, where data protection regulations like GDPR impose strict requirements on data security and breach notifications. A breach could result in regulatory penalties, reputational damage, and operational disruptions.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Immediately identify and inventory all Tableau Server instances in their environment, including version numbers, to assess exposure. 2) Upgrade all affected Tableau Server versions to the latest patched release provided by Tableau, as the vendor's support policy covers only the last 24 months of versions. 3) If immediate patching is not feasible, implement network-level controls to restrict access to Tableau Server Administration Agent services, such as firewall rules limiting connections to trusted management networks only. 4) Monitor network traffic and server logs for unusual file access patterns or unauthorized attempts to exploit path traversal. 5) Employ application-layer security controls, including web application firewalls (WAFs), configured to detect and block path traversal attempts targeting Tableau Server. 6) Conduct regular vulnerability scans and penetration tests focusing on Tableau Server to detect potential exploitation attempts. 7) Establish incident response procedures specific to Tableau Server compromise scenarios to enable rapid containment and remediation. 8) Educate IT and security teams about the criticality of this vulnerability and the importance of timely patching and monitoring.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Salesforce
- Date Reserved
- 2021-12-21T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecbd1
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 7/6/2025, 5:26:51 PM
Last updated: 8/14/2025, 11:59:04 PM
Views: 10
Related Threats
CVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumCVE-2025-9101: Cross Site Scripting in zhenfeng13 My-Blog
MediumCVE-2025-9100: Authentication Bypass by Capture-replay in zhenfeng13 My-Blog
MediumCVE-2025-9099: Unrestricted Upload in Acrel Environmental Monitoring Cloud Platform
MediumCVE-2025-9098: Improper Export of Android Application Components in Elseplus File Recovery App
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.