Skip to main content

CVE-2022-41435: n/a in n/a

Medium
VulnerabilityCVE-2022-41435cvecve-2022-41435
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

OpenWRT LuCI version git-22.140.66206-02913be was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /system/sshkeys.js. This vulnerability allows attackers to execute arbitrary web scripts or HTML via crafted public key comments.

AI-Powered Analysis

AILast updated: 07/07/2025, 01:55:02 UTC

Technical Analysis

CVE-2022-41435 is a stored cross-site scripting (XSS) vulnerability identified in the OpenWRT LuCI web interface, specifically in the /system/sshkeys.js component. OpenWRT is a widely used open-source Linux-based operating system for embedded devices, primarily routers. LuCI is its web-based configuration interface. The vulnerability arises because the application improperly sanitizes user-supplied input in the public key comments field when managing SSH keys. An attacker can craft malicious public key comments containing executable JavaScript or HTML code. When an administrator or user accesses the affected LuCI interface page that displays these SSH keys, the malicious script is executed in their browser context. This stored XSS can lead to session hijacking, credential theft, or unauthorized actions performed with the privileges of the logged-in user. The CVSS 3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, but needs privileges (authenticated user) and user interaction (viewing the malicious key). The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable module. No known exploits in the wild have been reported, and no official patches or vendor advisories are linked in the provided data. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application security flaw.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the deployment of OpenWRT-based devices with LuCI interfaces in their network infrastructure. Many small to medium enterprises and some larger organizations use OpenWRT routers or embedded devices for network management, especially in environments requiring customizable or cost-effective networking solutions. Exploitation of this vulnerability could allow attackers to execute arbitrary scripts in the context of network administrators or users managing these devices, potentially leading to theft of administrative credentials, unauthorized configuration changes, or pivoting deeper into the network. This could compromise network integrity and confidentiality, disrupt operations, and facilitate further attacks such as lateral movement or data exfiltration. Given that exploitation requires authenticated access and user interaction, the threat is more relevant in environments where multiple users have access to the LuCI interface or where attackers have obtained some level of user credentials. The lack of known exploits reduces immediate risk but does not eliminate it, especially as attackers may develop exploits over time. The medium severity suggests a moderate risk that should be addressed promptly to prevent escalation.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the LuCI web interface to trusted administrators only, ideally via network segmentation or VPN access, to reduce exposure. 2. Implement strict input validation and sanitization on the public key comments field to neutralize any embedded scripts; if possible, update to a patched version of OpenWRT LuCI once available. 3. Monitor and audit SSH key entries regularly for suspicious or malformed comments that could indicate attempted exploitation. 4. Enforce strong authentication mechanisms for accessing the LuCI interface, such as multi-factor authentication, to reduce the risk of unauthorized access. 5. Educate administrators about the risks of clicking on or viewing untrusted SSH key comments and encourage cautious behavior. 6. If patching is not immediately possible, consider disabling the SSH key management feature in LuCI or using alternative management methods until a fix is applied. 7. Keep OpenWRT and LuCI installations up to date with the latest security releases and monitor vendor advisories for patches addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdcb76

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 1:55:02 AM

Last updated: 8/16/2025, 7:25:54 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats