Skip to main content

CVE-2022-43752: n/a in n/a

High
VulnerabilityCVE-2022-43752cvecve-2022-43752
Published: Mon Oct 31 2022 (10/31/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Oracle Solaris version 10 1/13, when using the Common Desktop Environment (CDE), is vulnerable to a privilege escalation vulnerability. A low privileged user can escalate to root by crafting a malicious printer and double clicking on the the crafted printer's icon.

AI-Powered Analysis

AILast updated: 07/03/2025, 07:58:28 UTC

Technical Analysis

CVE-2022-43752 is a high-severity privilege escalation vulnerability affecting Oracle Solaris version 10 1/13 when using the Common Desktop Environment (CDE). The vulnerability allows a low-privileged user to escalate their privileges to root by crafting a malicious printer object and then double-clicking on the printer's icon within the CDE interface. This attack vector exploits a flaw related to improper handling of printer objects, likely involving memory corruption or buffer overflow issues, as indicated by the associated CWE-120 (Classic Buffer Overflow). The CVSS v3.1 score of 7.8 reflects a scenario where the attacker requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction beyond the double-click (UI:N). The impact includes full confidentiality, integrity, and availability compromise (C:H/I:H/A:H), as the attacker gains root-level control. No known exploits are currently reported in the wild, and no official patches or vendor advisories are listed, which suggests that affected organizations may still be vulnerable if they have not applied mitigations or upgrades. The vulnerability is specific to Solaris 10 1/13 with CDE, which is a legacy Unix operating system and desktop environment combination, still in use in some specialized or legacy environments.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the presence of Solaris 10 1/13 systems running CDE within their infrastructure. Such systems are typically found in legacy or specialized environments, including critical infrastructure, telecommunications, financial institutions, or government agencies that rely on Solaris for stability and performance. Successful exploitation would allow an attacker with local access to gain root privileges, potentially leading to full system compromise, unauthorized data access, disruption of services, and lateral movement within the network. Given the high confidentiality, integrity, and availability impact, this could result in significant operational disruption, data breaches, and compliance violations under regulations such as GDPR. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially if insider threats or attackers with initial access attempt privilege escalation. The legacy nature of the platform may also mean fewer security controls and monitoring, increasing risk.

Mitigation Recommendations

Mitigation should focus on reducing the attack surface and preventing local unprivileged users from exploiting this vulnerability. Specific recommendations include: 1) Identify and inventory all Solaris 10 1/13 systems running CDE within the environment. 2) Restrict local user access to these systems to only trusted personnel and enforce strict access controls. 3) Disable or remove the Common Desktop Environment (CDE) if it is not required, or restrict the ability to create or interact with printer objects. 4) Implement application whitelisting or endpoint protection solutions capable of detecting anomalous behavior related to printer object manipulation. 5) Monitor system logs and user activities for suspicious actions involving printer configurations or unexpected privilege escalations. 6) Where possible, upgrade or migrate from Solaris 10 1/13 to a supported and patched operating system version. 7) If vendor patches become available, apply them promptly. 8) Employ network segmentation to isolate legacy Solaris systems from critical network segments to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbda1de

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/3/2025, 7:58:28 AM

Last updated: 7/27/2025, 10:53:26 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats