Skip to main content

CVE-2022-42982: n/a in n/a

High
VulnerabilityCVE-2022-42982cvecve-2022-42982
Published: Thu Nov 17 2022 (11/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

BKG Professional NtripCaster 2.0.39 allows querying information over the UDP protocol without authentication. The NTRIP sourcetable is typically quite long (tens of kBs) and can be requested with a packet of only 30 bytes. This presents a vector that can be used for UDP amplification attacks. Normally, only authenticated streaming data will be provided over UDP and not the sourcetable.

AI-Powered Analysis

AILast updated: 07/02/2025, 04:55:06 UTC

Technical Analysis

CVE-2022-42982 is a high-severity vulnerability affecting BKG Professional NtripCaster version 2.0.39. The vulnerability arises because the NtripCaster allows unauthenticated querying of its NTRIP sourcetable over the UDP protocol. The sourcetable, which is typically tens of kilobytes in size, can be requested with a very small UDP packet of approximately 30 bytes. This discrepancy between the small request size and the large response size creates an opportunity for UDP amplification attacks. In such attacks, an adversary can spoof the source IP address in the request packet to be that of a victim, causing the NtripCaster to send a large volume of data to the victim, thereby overwhelming their network resources. Normally, only authenticated streaming data is provided over UDP, and the sourcetable is not accessible without authentication. However, this vulnerability bypasses that control, allowing unauthenticated access to the large sourcetable data. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, no required privileges or user interaction, and a significant impact on availability. There are no known exploits in the wild at this time, and no patches or vendor advisories are listed. The vulnerability is specifically related to the UDP protocol handling in the NtripCaster software, which is used in GNSS (Global Navigation Satellite System) data streaming environments, often for precise positioning and timing services.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for those relying on GNSS correction data services for critical infrastructure, surveying, agriculture, transportation, and telecommunications. A successful UDP amplification attack leveraging this vulnerability could be used as part of a distributed denial-of-service (DDoS) attack, either targeting the NtripCaster servers themselves or used as an amplifier to attack third-party victims. This could lead to service disruptions, degraded network performance, and potential downtime for systems dependent on GNSS correction data. Given the importance of precise positioning data in sectors such as autonomous vehicles, smart agriculture, and critical infrastructure monitoring, any disruption could have cascading operational and safety consequences. Additionally, the amplification vector could be abused by threat actors to mask their origin or to amplify attacks against European targets, increasing the overall threat landscape. The lack of authentication for sourcetable queries also raises concerns about information disclosure, although confidentiality impact is rated as none in the CVSS. The availability impact is high, which aligns with the potential for denial-of-service conditions.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following specific measures: 1) Restrict UDP traffic to and from NtripCaster servers using network-level controls such as firewalls and access control lists (ACLs) to only allow trusted clients and known IP ranges. 2) Deploy rate limiting on UDP requests to the NtripCaster to prevent abuse through rapid repeated queries. 3) If possible, upgrade to a patched version of the NtripCaster software once available or contact the vendor for guidance on secure configurations. 4) Implement network ingress filtering (BCP 38) to prevent IP address spoofing within the organization's network, reducing the risk of being used as an amplifier. 5) Monitor network traffic for unusual UDP patterns indicative of amplification abuse. 6) Consider isolating NtripCaster services within segmented network zones to limit exposure. 7) Evaluate alternative GNSS correction data delivery methods that enforce authentication for all data queries, including the sourcetable. These steps go beyond generic advice by focusing on network-level controls and operational monitoring tailored to the nature of this amplification vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee246

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 7/2/2025, 4:55:06 AM

Last updated: 8/1/2025, 6:11:13 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats