CVE-2022-29799: CWE-22 in networkd-dispatcher
A vulnerability was found in networkd-dispatcher. This flaw exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape from the “/etc/networkd-dispatcher” base directory.
AI Analysis
Technical Summary
CVE-2022-29799 is a medium-severity directory traversal vulnerability (CWE-22) found in networkd-dispatcher, a service used on Linux systems to manage network state changes and trigger scripts accordingly. The vulnerability arises because networkd-dispatcher does not properly sanitize input related to the OperationalState or AdministrativeState parameters. This lack of sanitization allows an attacker with limited privileges (local access with low privileges) to craft input that escapes the intended base directory (/etc/networkd-dispatcher) and access or manipulate files outside this directory. The vulnerability does not require user interaction but does require some level of local privilege (PR:L). The CVSS 3.1 score is 5.5 (medium), reflecting high confidentiality impact but no impact on integrity or availability. The attack vector is local (AV:L), meaning remote exploitation is not feasible without prior access. No known exploits are currently reported in the wild, and no patches or vendor fixes are linked in the provided data. The vulnerability could allow unauthorized reading of sensitive configuration or system files, potentially leading to information disclosure or aiding further privilege escalation attacks. The affected versions are unspecified, but the vulnerability is relevant to systems running networkd-dispatcher, commonly found in many Linux distributions, especially those using systemd for network management.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to Linux servers and workstations that utilize networkd-dispatcher for network state management. The confidentiality impact is significant because an attacker with local access could read sensitive files outside the intended directory, potentially exposing credentials, configuration files, or other sensitive data. This could facilitate further attacks such as privilege escalation or lateral movement within the network. While the vulnerability does not directly affect integrity or availability, the information disclosure could undermine security controls and compliance with data protection regulations such as GDPR. Organizations with critical infrastructure, government agencies, or enterprises relying on Linux-based network management are at higher risk. The requirement for local access limits the threat to insiders or attackers who have already compromised a low-privilege account, but the vulnerability could be leveraged in multi-stage attacks. The lack of known exploits suggests limited active threat currently, but the medium severity and potential impact warrant timely mitigation.
Mitigation Recommendations
1. Apply any available updates or patches from Linux distribution vendors as soon as they are released to address CVE-2022-29799. 2. Restrict local access to systems running networkd-dispatcher to trusted users only, minimizing the risk of exploitation by untrusted or compromised accounts. 3. Implement strict file system permissions on /etc/networkd-dispatcher and related directories to limit unauthorized file access. 4. Monitor logs and system behavior for unusual access patterns or attempts to traverse directories outside expected paths. 5. Employ mandatory access control (MAC) frameworks such as SELinux or AppArmor to enforce strict confinement of networkd-dispatcher processes. 6. Conduct regular audits of user privileges and remove unnecessary accounts or access rights to reduce the attack surface. 7. Educate system administrators and users about the risks of local privilege abuse and the importance of maintaining system hygiene. 8. Consider network segmentation and endpoint detection to limit the impact of any local compromise that could exploit this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2022-29799: CWE-22 in networkd-dispatcher
Description
A vulnerability was found in networkd-dispatcher. This flaw exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape from the “/etc/networkd-dispatcher” base directory.
AI-Powered Analysis
Technical Analysis
CVE-2022-29799 is a medium-severity directory traversal vulnerability (CWE-22) found in networkd-dispatcher, a service used on Linux systems to manage network state changes and trigger scripts accordingly. The vulnerability arises because networkd-dispatcher does not properly sanitize input related to the OperationalState or AdministrativeState parameters. This lack of sanitization allows an attacker with limited privileges (local access with low privileges) to craft input that escapes the intended base directory (/etc/networkd-dispatcher) and access or manipulate files outside this directory. The vulnerability does not require user interaction but does require some level of local privilege (PR:L). The CVSS 3.1 score is 5.5 (medium), reflecting high confidentiality impact but no impact on integrity or availability. The attack vector is local (AV:L), meaning remote exploitation is not feasible without prior access. No known exploits are currently reported in the wild, and no patches or vendor fixes are linked in the provided data. The vulnerability could allow unauthorized reading of sensitive configuration or system files, potentially leading to information disclosure or aiding further privilege escalation attacks. The affected versions are unspecified, but the vulnerability is relevant to systems running networkd-dispatcher, commonly found in many Linux distributions, especially those using systemd for network management.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to Linux servers and workstations that utilize networkd-dispatcher for network state management. The confidentiality impact is significant because an attacker with local access could read sensitive files outside the intended directory, potentially exposing credentials, configuration files, or other sensitive data. This could facilitate further attacks such as privilege escalation or lateral movement within the network. While the vulnerability does not directly affect integrity or availability, the information disclosure could undermine security controls and compliance with data protection regulations such as GDPR. Organizations with critical infrastructure, government agencies, or enterprises relying on Linux-based network management are at higher risk. The requirement for local access limits the threat to insiders or attackers who have already compromised a low-privilege account, but the vulnerability could be leveraged in multi-stage attacks. The lack of known exploits suggests limited active threat currently, but the medium severity and potential impact warrant timely mitigation.
Mitigation Recommendations
1. Apply any available updates or patches from Linux distribution vendors as soon as they are released to address CVE-2022-29799. 2. Restrict local access to systems running networkd-dispatcher to trusted users only, minimizing the risk of exploitation by untrusted or compromised accounts. 3. Implement strict file system permissions on /etc/networkd-dispatcher and related directories to limit unauthorized file access. 4. Monitor logs and system behavior for unusual access patterns or attempts to traverse directories outside expected paths. 5. Employ mandatory access control (MAC) frameworks such as SELinux or AppArmor to enforce strict confinement of networkd-dispatcher processes. 6. Conduct regular audits of user privileges and remove unnecessary accounts or access rights to reduce the attack surface. 7. Educate system administrators and users about the risks of local privilege abuse and the importance of maintaining system hygiene. 8. Consider network segmentation and endpoint detection to limit the impact of any local compromise that could exploit this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- fedora
- Date Reserved
- 2022-04-25T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68362776182aa0cae2250928
Added to database: 5/27/2025, 8:58:30 PM
Last enriched: 7/6/2025, 2:09:45 AM
Last updated: 7/31/2025, 12:48:49 AM
Views: 11
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.