ZoneMinder - Authentication Bypass (CVE-2022-39290)
8863Exploiting IPs reported
ZoneMinder is a free, open source Closed-circuit television software application. In affected versions authenticated users can bypass CSRF keys by modifying the request supplied to the Zoneminder web application. These modifications include replacing HTTP POST with an HTTP GET and removing the CSRF key from the request. An attacker can take advantage of this by using an HTTP GET request to perform actions with no CSRF protection. This could allow an attacker to cause an authenticated user to perform unexpected actions on the web application. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
CrowdSec analysis
CVE-2022-39290 is a vulnerability affecting ZoneMinder, an open source CCTV management system. The flaw allows authenticated users to bypass CSRF protections by manipulating specific requests, potentially enabling attackers to trick users into executing unintended actions within the application.
CrowdSec has been tracking this vulnerability and its exploits since 20th of December 2022.
CrowdSec network data shows that most actors exploiting CVE-2022-39290 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2022-39290 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2022-39290 is currently experiencing high visibility and active exploitation across the internet.
Attack patterns focus on modifying request methods to gain unauthorized access to CSRF-protected functionality within ZoneMinder deployments.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.