Search for vulnerabilities
Vulnerability details: VCID-7ghb-wt6a-aaah
Vulnerability ID VCID-7ghb-wt6a-aaah
Aliases CVE-2020-26137
GHSA-wqvq-5m8c-6g24
PYSEC-2020-148
Summary urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-26137.html
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4299
rhas Important https://access.redhat.com/errata/RHSA-2021:0034
rhas Moderate https://access.redhat.com/errata/RHSA-2021:0079
rhas Moderate https://access.redhat.com/errata/RHSA-2021:1631
rhas Moderate https://access.redhat.com/errata/RHSA-2021:1761
rhas Moderate https://access.redhat.com/errata/RHSA-2022:5235
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26137.json
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00215 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00234 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00421 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00652 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00652 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00652 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00652 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00652 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00652 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00652 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00652 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00652 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00652 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
epss 0.00652 https://api.first.org/data/v1/epss?cve=CVE-2020-26137
cvssv3.1 6.5 https://bugs.python.org/issue39603
generic_textual MODERATE https://bugs.python.org/issue39603
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1883632
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137
cvssv3.1 5.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-wqvq-5m8c-6g24
cvssv3.1 6.5 https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2020-148.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2020-148.yaml
cvssv3.1 4.4 https://github.com/urllib3/urllib3
cvssv3.1 6.5 https://github.com/urllib3/urllib3
generic_textual MODERATE https://github.com/urllib3/urllib3
cvssv3.1 6.5 https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b
generic_textual MODERATE https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b
cvssv3.1 6.5 https://github.com/urllib3/urllib3/pull/1800
generic_textual MODERATE https://github.com/urllib3/urllib3/pull/1800
cvssv3.1 6.5 https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html
cvssv3.1 5.9 https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
cvssv3.1 6.5 https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
cvssv2 6.4 https://nvd.nist.gov/vuln/detail/CVE-2020-26137
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2020-26137
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2020-26137
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2020-26137
generic_textual Medium https://ubuntu.com/security/notices/USN-4570-1
cvssv3.1 6.5 https://usn.ubuntu.com/4570-1
generic_textual MODERATE https://usn.ubuntu.com/4570-1
cvssv3.1 6.5 https://www.oracle.com/security-alerts/cpujul2022.html
cvssv3.1 7.5 https://www.oracle.com/security-alerts/cpujul2022.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpujul2022.html
generic_textual MODERATE https://www.oracle.com/security-alerts/cpujul2022.html
cvssv3.1 6.5 https://www.oracle.com/security-alerts/cpuoct2021.html
cvssv3.1 8.2 https://www.oracle.com/security-alerts/cpuoct2021.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpuoct2021.html
generic_textual MODERATE https://www.oracle.com/security-alerts/cpuoct2021.html
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-26137.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26137.json
https://api.first.org/data/v1/epss?cve=CVE-2020-26137
https://bugs.python.org/issue39603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2020-148.yaml
https://github.com/urllib3/urllib3
https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b
https://github.com/urllib3/urllib3/pull/1800
https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
https://ubuntu.com/security/notices/USN-4570-1
https://usn.ubuntu.com/4570-1
https://usn.ubuntu.com/4570-1/
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
1883632 https://bugzilla.redhat.com/show_bug.cgi?id=1883632
cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2020-26137 https://nvd.nist.gov/vuln/detail/CVE-2020-26137
GHSA-wqvq-5m8c-6g24 https://github.com/advisories/GHSA-wqvq-5m8c-6g24
RHSA-2020:4299 https://access.redhat.com/errata/RHSA-2020:4299
RHSA-2021:0034 https://access.redhat.com/errata/RHSA-2021:0034
RHSA-2021:0079 https://access.redhat.com/errata/RHSA-2021:0079
RHSA-2021:1631 https://access.redhat.com/errata/RHSA-2021:1631
RHSA-2021:1761 https://access.redhat.com/errata/RHSA-2021:1761
RHSA-2022:5235 https://access.redhat.com/errata/RHSA-2022:5235
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26137.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://bugs.python.org/issue39603
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2020-148.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/urllib3/urllib3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://github.com/urllib3/urllib3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://github.com/urllib3/urllib3/pull/1800
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N Found at https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-26137
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-26137
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-26137
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://usn.ubuntu.com/4570-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://www.oracle.com/security-alerts/cpujul2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://www.oracle.com/security-alerts/cpujul2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://www.oracle.com/security-alerts/cpuoct2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N Found at https://www.oracle.com/security-alerts/cpuoct2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.41127
EPSS Score 0.00215
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.