Search for vulnerabilities
Vulnerability details: VCID-177c-5b67-aaaf
Vulnerability ID VCID-177c-5b67-aaaf
Aliases CVE-2022-35409
Summary An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.2.0. In some configurations, an unauthenticated attacker can send an invalid ClientHello message to a DTLS server that causes a heap-based buffer over-read of up to 255 bytes. This can cause a server crash or possibly information disclosure based on error responses. Affected configurations have MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled and MBEDTLS_SSL_IN_CONTENT_LEN less than a threshold that depends on the configuration: 258 bytes if using mbedtls_ssl_cookie_check, and possibly up to 571 bytes with a custom cookie check function.
Status Published
Exploitability 0.5
Weighted Severity 8.2
Risk 4.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00135 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00439 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.00519 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
epss 0.01042 https://api.first.org/data/v1/epss?cve=CVE-2022-35409
cvssv3 9.1 https://nvd.nist.gov/vuln/detail/CVE-2022-35409
cvssv3.1 9.1 https://nvd.nist.gov/vuln/detail/CVE-2022-35409
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-35409
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-35409
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.49858
EPSS Score 0.00135
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.