Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-44354: n/a in n/a

0
Critical
VulnerabilityCVE-2022-44354cvecve-2022-44354n-acwe-434
Published: Tue Nov 29 2022 (11/29/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

SolarView Compact 4.0 and 5.0 is vulnerable to Unrestricted File Upload via a crafted php file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 06/22/2025, 04:52:33 UTC

Technical Analysis

CVE-2022-44354 is a critical vulnerability affecting SolarView Compact versions 4.0 and 5.0. The vulnerability is classified as an Unrestricted File Upload (CWE-434), which allows an attacker to upload arbitrary files, including malicious PHP scripts, to the affected system. This type of vulnerability arises when the application fails to properly validate or restrict the types of files that users can upload. In this case, the attacker can craft a PHP file and upload it without restriction, potentially leading to remote code execution (RCE). The vulnerability has a CVSS 3.1 base score of 9.8, indicating a critical severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack can be performed remotely over the network without any privileges or user interaction, and it impacts confidentiality, integrity, and availability to a high degree. Although the vendor and product details are not explicitly stated beyond the product name SolarView Compact, this software is typically used in industrial or infrastructure monitoring environments. The absence of available patches or mitigations in the provided data suggests that the vulnerability may remain unpatched, increasing the risk of exploitation. No known exploits in the wild have been reported yet, but the ease of exploitation and the critical impact make this a significant threat. The vulnerability could allow attackers to execute arbitrary code on the affected system, leading to full system compromise, data theft, disruption of services, or use of the system as a pivot point for further attacks within a network.

Potential Impact

For European organizations, especially those operating critical infrastructure, industrial control systems, or utilities that rely on SolarView Compact for monitoring and management, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized access to sensitive operational data, manipulation or disruption of industrial processes, and potential downtime of critical services. The high impact on confidentiality, integrity, and availability means that attackers could steal proprietary or sensitive information, alter system configurations or data, and cause denial of service conditions. This could have cascading effects on supply chains, public safety, and regulatory compliance. Given the remote and unauthenticated nature of the exploit, attackers could target these systems from anywhere, increasing the threat landscape. The lack of user interaction requirement further lowers the barrier for exploitation. Organizations in sectors such as energy, manufacturing, water treatment, and transportation that use SolarView Compact are at heightened risk. Additionally, the potential for attackers to establish persistent footholds and move laterally within networks could lead to broader organizational compromise.

Mitigation Recommendations

1. Immediate network segmentation: Isolate SolarView Compact systems from general enterprise networks and restrict access to trusted administrators only. 2. Implement strict ingress filtering and firewall rules to limit exposure of SolarView Compact interfaces to the internet or untrusted networks. 3. Monitor network traffic for unusual file upload activity or unexpected HTTP POST requests targeting the SolarView Compact upload endpoints. 4. Employ application-layer web security controls such as Web Application Firewalls (WAFs) configured to detect and block malicious file uploads, especially PHP or other executable scripts. 5. Conduct thorough audits of existing uploaded files on SolarView Compact systems to detect any unauthorized or suspicious files. 6. If possible, apply vendor patches or updates as soon as they become available; in the absence of patches, consider temporary workarounds such as disabling file upload functionality or restricting file types accepted by the application. 7. Harden the underlying web server and operating system by disabling unnecessary services, applying the principle of least privilege, and ensuring all software components are up to date. 8. Implement strong logging and alerting mechanisms to detect and respond to exploitation attempts promptly. 9. Educate operational technology (OT) and IT teams about this vulnerability and establish incident response plans specific to potential exploitation scenarios involving SolarView Compact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-30T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbf0282

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/22/2025, 4:52:33 AM

Last updated: 3/25/2026, 11:24:28 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses