PatchSiren cyber security CVE debrief
CVE-2022-46169 Cacti CVE debrief
CVE-2022-46169 is a Cacti command injection vulnerability that CISA placed in the Known Exploited Vulnerabilities catalog on 2023-02-16. Because it is marked as actively exploited, organizations running Cacti should treat remediation as urgent and apply vendor-recommended updates as soon as possible.
- Vendor
- Cacti
- Product
- Cacti
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2023-02-16
- Original CVE updated
- 2023-02-16
- Advisory published
- 2023-02-16
- Advisory updated
- 2023-02-16
Who should care
Organizations that operate Cacti, especially teams responsible for internet-facing monitoring or administration systems, should prioritize this CVE. Security operations teams should also watch for signs of suspicious command execution or unexpected changes on affected hosts.
Technical summary
The available source corpus identifies CVE-2022-46169 as a command injection issue in Cacti. CISA’s KEV entry confirms it is known to be exploited in the wild and directs defenders to apply updates per vendor instructions. No additional technical detail is provided in the supplied sources.
Defensive priority
Critical. This CVE is in CISA’s Known Exploited Vulnerabilities catalog, which indicates active exploitation and warrants immediate remediation planning and exposure review.
Recommended defensive actions
- Apply the vendor-recommended update or mitigation for Cacti as soon as possible.
- Confirm which Cacti instances are deployed, their versions, and whether any are internet-facing or otherwise broadly accessible.
- Restrict administrative and network access to Cacti systems until remediation is complete.
- Review logs and host activity for suspicious command execution or unexpected process behavior on affected systems.
- After updating, verify the deployment and continue monitoring for indicators of compromise or abnormal changes.
Evidence notes
The classification and exploitation status come from CISA’s Known Exploited Vulnerabilities catalog entry for CVE-2022-46169. The source item metadata also points to the NVD record and the Cacti GitHub security advisory as supporting references, but only the supplied official links are used here. No CVSS score was provided in the source corpus.
Official resources
-
CVE-2022-46169 CVE record
CVE.org
-
CVE-2022-46169 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
Publicly disclosed CVE with a CISA KEV entry dated 2023-02-16; exploitation status is based on CISA’s published catalog entry. This debrief avoids exploit details and uses only the supplied official sources.