PatchSiren

PatchSiren cyber security CVE debrief

CVE-2022-46169 Cacti CVE debrief

CVE-2022-46169 is a Cacti command injection vulnerability that CISA placed in the Known Exploited Vulnerabilities catalog on 2023-02-16. Because it is marked as actively exploited, organizations running Cacti should treat remediation as urgent and apply vendor-recommended updates as soon as possible.

Vendor
Cacti
Product
Cacti
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2023-02-16
Original CVE updated
2023-02-16
Advisory published
2023-02-16
Advisory updated
2023-02-16

Who should care

Organizations that operate Cacti, especially teams responsible for internet-facing monitoring or administration systems, should prioritize this CVE. Security operations teams should also watch for signs of suspicious command execution or unexpected changes on affected hosts.

Technical summary

The available source corpus identifies CVE-2022-46169 as a command injection issue in Cacti. CISA’s KEV entry confirms it is known to be exploited in the wild and directs defenders to apply updates per vendor instructions. No additional technical detail is provided in the supplied sources.

Defensive priority

Critical. This CVE is in CISA’s Known Exploited Vulnerabilities catalog, which indicates active exploitation and warrants immediate remediation planning and exposure review.

Recommended defensive actions

  • Apply the vendor-recommended update or mitigation for Cacti as soon as possible.
  • Confirm which Cacti instances are deployed, their versions, and whether any are internet-facing or otherwise broadly accessible.
  • Restrict administrative and network access to Cacti systems until remediation is complete.
  • Review logs and host activity for suspicious command execution or unexpected process behavior on affected systems.
  • After updating, verify the deployment and continue monitoring for indicators of compromise or abnormal changes.

Evidence notes

The classification and exploitation status come from CISA’s Known Exploited Vulnerabilities catalog entry for CVE-2022-46169. The source item metadata also points to the NVD record and the Cacti GitHub security advisory as supporting references, but only the supplied official links are used here. No CVSS score was provided in the source corpus.

Official resources

Publicly disclosed CVE with a CISA KEV entry dated 2023-02-16; exploitation status is based on CISA’s published catalog entry. This debrief avoids exploit details and uses only the supplied official sources.