Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

CWP Flaws That Expose Servers to Remote Attacks Possibly Exploited in the Wild

Researchers discovered that the Control Web Panel (CWP) web hosting panel is affected by two serious vulnerabilities that can allow attackers to remotely hack servers, and it’s possible that they may have already been exploited in the wild.

Researchers discovered that the Control Web Panel (CWP) web hosting panel is affected by two serious vulnerabilities that can allow attackers to remotely hack servers, and it’s possible that they may have already been exploited in the wild.

CWP, which has both free and paid versions, is an advanced Linux control panel designed for web hosting providers and system administrators.

In a blog post published last week, Octagon Networks, which describes itself as a global team of hackers and security researchers, disclosed the details of two vulnerabilities that can be chained to hack servers running CWP, remotely from the internet and without any user interaction.

One of the vulnerabilities is CVE-2021-45467, described as a file inclusion issue, and the other is CVE-2021-45466, a file write flaw. Chaining the two security holes can lead to unauthenticated remote command execution with root privileges.

While the developer of CWP says on its website that there are 30,000 servers running the control panel, Octagon researchers noted that the Shodan and Censys internet search engines show over 100,000 results each.

Shodan search results for cwpsrv

Shodan told SecurityWeek that there has been a steady increase in the use of CWP over the past years.

CWP use trends

According to the blog post published by Octagon, they have seen indications that someone has managed to “reverse the patch and exploit some servers.”

Octagon’s Paulos Yibelo told SecurityWeek that while they are not sure whether the vulnerabilities have in fact been exploited, it is “possible.”

Advertisement. Scroll to continue reading.

CWP developers patched the vulnerabilities with recent updates.

In addition to the blog post describing the findings, Octagon has released a video showing the exploit in action, and they also plan on making public a full proof-of-concept (PoC) exploit after admins have had enough time to install the patches.

*updated with information from Shodan

Related: High-Risk Flaw Haunts Apache Server

Related: Recently Patched Apache HTTP Server Vulnerability Exploited in Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.