Skip to main content

CVE-2022-34822: Path traversal in NEC Corporation CLUSTERPRO X

Critical
VulnerabilityCVE-2022-34822cvecve-2022-34822
Published: Tue Nov 08 2022 (11/08/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: NEC Corporation
Product: CLUSTERPRO X

Description

Path traversal vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code.

AI-Powered Analysis

AILast updated: 07/03/2025, 07:13:15 UTC

Technical Analysis

CVE-2022-34822 is a critical path traversal vulnerability affecting NEC Corporation's CLUSTERPRO X and EXPRESSCLUSTER X products version 5.0 for Windows and earlier, including their SingleServerSafe variants. This vulnerability allows a remote attacker with no authentication and no user interaction required to perform path traversal attacks. By exploiting this flaw, the attacker can overwrite arbitrary files on the affected system's file system. This capability can lead to the execution of arbitrary code, potentially allowing full system compromise. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), indicating that the software fails to properly sanitize or validate file path inputs, enabling attackers to escape intended directory boundaries. The CVSS v3.1 base score is 9.8 (critical), reflecting the high impact on confidentiality, integrity, and availability, combined with ease of exploitation (network vector, no privileges required, no user interaction). Although no known exploits have been reported in the wild as of the publication date, the severity and nature of the vulnerability make it a significant risk. The affected products are clustering and high-availability solutions primarily used in enterprise environments to ensure system uptime and data integrity. An attacker exploiting this vulnerability could disrupt critical services, modify or delete important files, and gain persistent control over affected systems.

Potential Impact

For European organizations, the impact of CVE-2022-34822 could be severe, especially for enterprises relying on NEC's CLUSTERPRO X and EXPRESSCLUSTER X for high-availability and clustering solutions. Successful exploitation could lead to unauthorized modification or deletion of critical files, service disruption, and potential full system compromise. This could affect sectors such as finance, manufacturing, telecommunications, and government agencies that depend on continuous availability and data integrity. The ability to execute arbitrary code remotely without authentication increases the risk of ransomware deployment, data breaches, and lateral movement within networks. Additionally, disruption of clustering services could lead to downtime, impacting business continuity and causing financial and reputational damage. Given the critical nature of the vulnerability, organizations may face regulatory and compliance consequences if they fail to address it promptly.

Mitigation Recommendations

1. Immediate application of vendor-provided patches or updates once available is the most effective mitigation. Since no patch links are provided, organizations should monitor NEC's official security advisories and apply updates promptly. 2. Implement network-level controls to restrict access to management interfaces of CLUSTERPRO X and EXPRESSCLUSTER X products, limiting exposure to trusted IP addresses only. 3. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics capable of detecting path traversal attempts targeting these products. 4. Conduct thorough audits of file system permissions and ensure that the service accounts running these clustering solutions have the least privileges necessary, minimizing potential damage from exploitation. 5. Monitor system and application logs for unusual file modification activities or unauthorized access attempts. 6. Consider network segmentation to isolate critical clustering infrastructure from general user networks and internet-facing systems. 7. Develop and test incident response plans specifically addressing potential exploitation scenarios of this vulnerability. 8. Engage with NEC support for guidance and to confirm patch availability and deployment best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
NEC
Date Reserved
2022-06-29T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbebd04

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 7/3/2025, 7:13:15 AM

Last updated: 8/18/2025, 7:43:58 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats