Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-31125: CWE-287: Improper Authentication in hap-wi roxy-wi

0
Medium
Published: Wed Jul 06 2022 (07/06/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: hap-wi
Product: roxy-wi

Description

Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to bypass authentication and access admin functionality by sending a specially crafted HTTP request. This affects Roxywi versions before 6.1.1.0. Users are advised to upgrade. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 02:52:07 UTC

Technical Analysis

CVE-2022-31125 is a security vulnerability classified under CWE-287 (Improper Authentication) affecting Roxy-wi, an open-source web interface designed to manage popular server software including HAProxy, Nginx, Apache, and Keepalived. The vulnerability exists in Roxy-wi versions prior to 6.1.1.0 and allows a remote attacker to bypass authentication mechanisms without any credentials by sending a specially crafted HTTP request. This unauthorized access grants the attacker administrative privileges within the Roxy-wi interface, enabling full control over the management of the underlying server infrastructure. Since Roxy-wi is used to configure and monitor critical load balancing and web server components, exploitation could lead to unauthorized configuration changes, service disruptions, or further compromise of the managed servers. The vulnerability does not require user interaction or authentication, increasing its risk profile. No known exploits have been reported in the wild, and no workarounds exist other than upgrading to version 6.1.1.0 or later, which addresses the authentication bypass flaw.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for enterprises and service providers relying on Roxy-wi to manage their web and load balancing infrastructure. Unauthorized administrative access could lead to manipulation of server configurations, potentially causing denial of service, interception or redirection of traffic, or deployment of malicious payloads on critical infrastructure. This could disrupt business operations, compromise sensitive data, and damage organizational reputation. Given the central role of HAProxy, Nginx, Apache, and Keepalived in web services and network availability, exploitation could affect availability and integrity of services. Sectors such as finance, telecommunications, government, and critical infrastructure operators in Europe, which often deploy these technologies, are particularly at risk. The lack of authentication requirement and ease of exploitation increase the likelihood of attacks if systems remain unpatched.

Mitigation Recommendations

The primary and most effective mitigation is to upgrade Roxy-wi installations to version 6.1.1.0 or later, where the authentication bypass vulnerability has been fixed. Organizations should conduct an immediate inventory of Roxy-wi deployments and prioritize patching. In environments where immediate upgrade is not feasible, restricting network access to the Roxy-wi interface via firewall rules or VPNs can reduce exposure by limiting access to trusted administrators only. Implementing network segmentation to isolate management interfaces from general user networks is also recommended. Monitoring HTTP requests to the Roxy-wi interface for unusual or malformed requests may help detect exploitation attempts. Additionally, organizations should review and harden access controls on the underlying managed servers to limit the impact of any potential compromise. Regular security audits and penetration testing focusing on management interfaces can help identify similar weaknesses proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf36eb

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 2:52:07 AM

Last updated: 2/4/2026, 8:38:55 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats