Search for vulnerabilities
Vulnerability details: VCID-5khv-27u8-aaaa
Vulnerability ID VCID-5khv-27u8-aaaa
Aliases CVE-2022-2097
GHSA-3wx7-46ch-7rq2
VC-OPENSSL-20220705-CVE-2022-2097
Summary AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (6)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2022:5818
rhas Moderate https://access.redhat.com/errata/RHSA-2022:6224
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2097.json
epss 0.00462 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00462 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00462 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00518 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00533 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00533 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00553 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00598 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00655 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00847 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00847 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00847 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00847 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00847 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00847 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00847 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00847 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00847 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.00847 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2022-2097
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=2104905
cvssv3.1 9.1 https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
generic_textual CRITICAL https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-3wx7-46ch-7rq2
cvssv3.1 7.5 https://github.com/alexcrichton/openssl-src-rs
generic_textual HIGH https://github.com/alexcrichton/openssl-src-rs
cvssv3.1 7.5 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431
generic_textual HIGH https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431
cvssv3.1 7.5 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93
generic_textual HIGH https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93
cvssv3.1 7.5 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431
generic_textual HIGH https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431
cvssv3.1 7.5 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93
generic_textual HIGH https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93
cvssv3.1 7.5 https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2022-2097
cvssv3 5.3 https://nvd.nist.gov/vuln/detail/CVE-2022-2097
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2022-2097
cvssv3.1 7.5 https://rustsec.org/advisories/RUSTSEC-2022-0032.html
generic_textual HIGH https://rustsec.org/advisories/RUSTSEC-2022-0032.html
cvssv3.1 7.5 https://security.gentoo.org/glsa/202210-02
generic_textual HIGH https://security.gentoo.org/glsa/202210-02
cvssv3.1 7.5 https://security.netapp.com/advisory/ntap-20220715-0011
generic_textual HIGH https://security.netapp.com/advisory/ntap-20220715-0011
cvssv3.1 7.5 https://security.netapp.com/advisory/ntap-20230420-0008
generic_textual HIGH https://security.netapp.com/advisory/ntap-20230420-0008
cvssv3.1 6.5 https://security.netapp.com/advisory/ntap-20240621-0006
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20240621-0006
cvssv3.1 7.5 https://www.debian.org/security/2023/dsa-5343
generic_textual HIGH https://www.debian.org/security/2023/dsa-5343
cvssv3.1 7.5 https://www.openssl.org/news/secadv/20220705.txt
generic_textual HIGH https://www.openssl.org/news/secadv/20220705.txt
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2097.json
https://api.first.org/data/v1/epss?cve=CVE-2022-2097
https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/alexcrichton/openssl-src-rs
https://github.com/openssl/openssl/commit/919925673d6c9cfed3c1085497f5dfbbed5fc431
https://github.com/openssl/openssl/commit/a98f339ddd7e8f487d6e0088d4a9a42324885a93
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93
https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/
https://rustsec.org/advisories/RUSTSEC-2022-0032.html
https://security.gentoo.org/glsa/202210-02
https://security.netapp.com/advisory/ntap-20220715-0011
https://security.netapp.com/advisory/ntap-20220715-0011/
https://security.netapp.com/advisory/ntap-20230420-0008
https://security.netapp.com/advisory/ntap-20230420-0008/
https://security.netapp.com/advisory/ntap-20240621-0006
https://security.netapp.com/advisory/ntap-20240621-0006/
https://www.debian.org/security/2023/dsa-5343
https://www.openssl.org/news/secadv/20220705.txt
1023424 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023424
2104905 https://bugzilla.redhat.com/show_bug.cgi?id=2104905
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
CVE-2022-2097 https://nvd.nist.gov/vuln/detail/CVE-2022-2097
GHSA-3wx7-46ch-7rq2 https://github.com/advisories/GHSA-3wx7-46ch-7rq2
RHSA-2022:5818 https://access.redhat.com/errata/RHSA-2022:5818
RHSA-2022:6224 https://access.redhat.com/errata/RHSA-2022:6224
USN-5502-1 https://usn.ubuntu.com/5502-1/
USN-6457-1 https://usn.ubuntu.com/6457-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2097.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/alexcrichton/openssl-src-rs
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-2097
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-2097
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-2097
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://rustsec.org/advisories/RUSTSEC-2022-0032.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.gentoo.org/glsa/202210-02
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20220715-0011
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20230420-0008
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20240621-0006
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.debian.org/security/2023/dsa-5343
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.openssl.org/news/secadv/20220705.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.75125
EPSS Score 0.00462
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.