CVE-2022-36110: CWE-1220: Insufficient Granularity of Access Control in gravitl netmaker
Netmaker makes networks with WireGuard. Prior to version 0.15.1, Improper Authorization functions lead to non-privileged users running privileged API calls. If someone adds users to the Netmaker platform who do not have admin privileges, they can use their auth tokens to run admin-level functions via the API. This problem has been patched in v0.15.1.
AI Analysis
Technical Summary
CVE-2022-36110 is a vulnerability identified in the Netmaker platform, a network management tool that leverages WireGuard for creating and managing virtual private networks. The issue arises from insufficient granularity in access control mechanisms prior to version 0.15.1. Specifically, non-privileged users, who are added to the Netmaker platform without administrative rights, can exploit improper authorization checks to execute privileged API functions. This means that these users can leverage their authentication tokens to perform admin-level operations via the API, bypassing intended access restrictions. The root cause is an improper authorization implementation (CWE-285) combined with insufficient granularity of access control (CWE-1220), which fails to differentiate adequately between user privilege levels. This vulnerability could allow unauthorized privilege escalation within the platform, potentially leading to unauthorized configuration changes, network manipulation, or exposure of sensitive network data. The vulnerability was publicly disclosed in September 2022 and has been patched in Netmaker version 0.15.1. There are no known exploits in the wild as of the latest information, but the nature of the vulnerability makes it a significant risk if unpatched, especially in environments where Netmaker is used to manage critical network infrastructure.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on Netmaker for secure network management and VPN orchestration. Unauthorized administrative access could lead to compromise of network configurations, unauthorized creation or modification of VPN tunnels, and potential exposure of internal network traffic. This could disrupt business operations, lead to data breaches, or facilitate lateral movement by attackers within corporate networks. Organizations in sectors such as finance, healthcare, critical infrastructure, and government, which often require stringent network security, could face elevated risks. Additionally, since Netmaker integrates with WireGuard, a widely adopted VPN technology, exploitation could undermine the confidentiality and integrity of network communications. The absence of known exploits does not eliminate risk, as attackers may develop exploits targeting unpatched systems. The medium severity rating reflects the potential for privilege escalation and network compromise, balanced against the requirement that an attacker must already have a valid user account on the platform.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading Netmaker installations to version 0.15.1 or later, where the access control flaws have been addressed. Beyond patching, organizations should audit user accounts on the Netmaker platform to ensure that only trusted personnel have access, and that user privileges are assigned following the principle of least privilege. Implementing multi-factor authentication (MFA) for Netmaker user accounts can reduce the risk of compromised credentials being used to exploit this vulnerability. Network segmentation should be employed to limit the exposure of the Netmaker management interface to trusted internal networks or VPNs only. Additionally, organizations should monitor API usage logs for unusual or unauthorized administrative actions, which could indicate exploitation attempts. Regular security assessments and penetration testing focused on access control mechanisms in network management tools like Netmaker can help identify and remediate similar issues proactively. Finally, organizations should maintain an inventory of all network management tools in use and ensure timely application of security updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2022-36110: CWE-1220: Insufficient Granularity of Access Control in gravitl netmaker
Description
Netmaker makes networks with WireGuard. Prior to version 0.15.1, Improper Authorization functions lead to non-privileged users running privileged API calls. If someone adds users to the Netmaker platform who do not have admin privileges, they can use their auth tokens to run admin-level functions via the API. This problem has been patched in v0.15.1.
AI-Powered Analysis
Technical Analysis
CVE-2022-36110 is a vulnerability identified in the Netmaker platform, a network management tool that leverages WireGuard for creating and managing virtual private networks. The issue arises from insufficient granularity in access control mechanisms prior to version 0.15.1. Specifically, non-privileged users, who are added to the Netmaker platform without administrative rights, can exploit improper authorization checks to execute privileged API functions. This means that these users can leverage their authentication tokens to perform admin-level operations via the API, bypassing intended access restrictions. The root cause is an improper authorization implementation (CWE-285) combined with insufficient granularity of access control (CWE-1220), which fails to differentiate adequately between user privilege levels. This vulnerability could allow unauthorized privilege escalation within the platform, potentially leading to unauthorized configuration changes, network manipulation, or exposure of sensitive network data. The vulnerability was publicly disclosed in September 2022 and has been patched in Netmaker version 0.15.1. There are no known exploits in the wild as of the latest information, but the nature of the vulnerability makes it a significant risk if unpatched, especially in environments where Netmaker is used to manage critical network infrastructure.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on Netmaker for secure network management and VPN orchestration. Unauthorized administrative access could lead to compromise of network configurations, unauthorized creation or modification of VPN tunnels, and potential exposure of internal network traffic. This could disrupt business operations, lead to data breaches, or facilitate lateral movement by attackers within corporate networks. Organizations in sectors such as finance, healthcare, critical infrastructure, and government, which often require stringent network security, could face elevated risks. Additionally, since Netmaker integrates with WireGuard, a widely adopted VPN technology, exploitation could undermine the confidentiality and integrity of network communications. The absence of known exploits does not eliminate risk, as attackers may develop exploits targeting unpatched systems. The medium severity rating reflects the potential for privilege escalation and network compromise, balanced against the requirement that an attacker must already have a valid user account on the platform.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading Netmaker installations to version 0.15.1 or later, where the access control flaws have been addressed. Beyond patching, organizations should audit user accounts on the Netmaker platform to ensure that only trusted personnel have access, and that user privileges are assigned following the principle of least privilege. Implementing multi-factor authentication (MFA) for Netmaker user accounts can reduce the risk of compromised credentials being used to exploit this vulnerability. Network segmentation should be employed to limit the exposure of the Netmaker management interface to trusted internal networks or VPNs only. Additionally, organizations should monitor API usage logs for unusual or unauthorized administrative actions, which could indicate exploitation attempts. Regular security assessments and penetration testing focused on access control mechanisms in network management tools like Netmaker can help identify and remediate similar issues proactively. Finally, organizations should maintain an inventory of all network management tools in use and ensure timely application of security updates.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf3e6d
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 9:50:19 PM
Last updated: 2/7/2026, 8:30:08 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighCVE-2026-2074: XML External Entity Reference in O2OA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.