Search for vulnerabilities
Vulnerability details: VCID-d7vw-bres-aaan
Vulnerability ID VCID-d7vw-bres-aaan
Aliases CVE-2022-21443
Summary Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2022:1435
rhas Important https://access.redhat.com/errata/RHSA-2022:1436
rhas Important https://access.redhat.com/errata/RHSA-2022:1437
rhas Important https://access.redhat.com/errata/RHSA-2022:1439
rhas Important https://access.redhat.com/errata/RHSA-2022:1440
rhas Important https://access.redhat.com/errata/RHSA-2022:1441
rhas Important https://access.redhat.com/errata/RHSA-2022:1442
rhas Important https://access.redhat.com/errata/RHSA-2022:1443
rhas Important https://access.redhat.com/errata/RHSA-2022:1444
rhas Important https://access.redhat.com/errata/RHSA-2022:1445
rhas Important https://access.redhat.com/errata/RHSA-2022:1487
rhas Important https://access.redhat.com/errata/RHSA-2022:1488
rhas Important https://access.redhat.com/errata/RHSA-2022:1489
rhas Important https://access.redhat.com/errata/RHSA-2022:1490
rhas Important https://access.redhat.com/errata/RHSA-2022:1491
rhas Important https://access.redhat.com/errata/RHSA-2022:1728
rhas Important https://access.redhat.com/errata/RHSA-2022:1729
rhas Important https://access.redhat.com/errata/RHSA-2022:2137
rhas Moderate https://access.redhat.com/errata/RHSA-2022:4957
rhas Moderate https://access.redhat.com/errata/RHSA-2022:4959
rhas Moderate https://access.redhat.com/errata/RHSA-2022:5837
cvssv3 3.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00219 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00250 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00250 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00250 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00250 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2022-21443
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=2075793
cvssv3.1 3.7 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2022-21443
cvssv3 3.7 https://nvd.nist.gov/vuln/detail/CVE-2022-21443
archlinux High https://security.archlinux.org/AVG-2686
archlinux High https://security.archlinux.org/AVG-2687
archlinux High https://security.archlinux.org/AVG-2688
archlinux High https://security.archlinux.org/AVG-2689
cvssv3.1 5.3 https://www.oracle.com/security-alerts/cpuapr2022.html
generic_textual MODERATE https://www.oracle.com/security-alerts/cpuapr2022.html
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
https://api.first.org/data/v1/epss?cve=CVE-2022-21443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
https://security.netapp.com/advisory/ntap-20220429-0006/
https://security.netapp.com/advisory/ntap-20240621-0006/
https://www.debian.org/security/2022/dsa-5128
https://www.debian.org/security/2022/dsa-5131
https://www.oracle.com/security-alerts/cpuapr2022.html
2075793 https://bugzilla.redhat.com/show_bug.cgi?id=2075793
AVG-2686 https://security.archlinux.org/AVG-2686
AVG-2687 https://security.archlinux.org/AVG-2687
AVG-2688 https://security.archlinux.org/AVG-2688
AVG-2689 https://security.archlinux.org/AVG-2689
cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:azul:zulu:11.54:*:*:*:*:*:*:*
cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:azul:zulu:13.46:*:*:*:*:*:*:*
cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:azul:zulu:15.38:*:*:*:*:*:*:*
cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:azul:zulu:17.32:*:*:*:*:*:*:*
cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:azul:zulu:18.28:*:*:*:*:*:*:*
cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:azul:zulu:6.45:*:*:*:*:*:*:*
cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:azul:zulu:7.52:*:*:*:*:*:*:*
cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:azul:zulu:8.60:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:20.3.5:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:20.3.5:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.1:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:21.3.1:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:22.0.0.2:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:22.0.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:java_se:11.0.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:11.0.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:java_se:17.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:17.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:java_se:18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:java_se:7u331:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:7u331:*:*:*:*:*:*:*
cpe:2.3:a:oracle:java_se:8u321:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u321:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2022-21443 https://nvd.nist.gov/vuln/detail/CVE-2022-21443
RHSA-2022:1435 https://access.redhat.com/errata/RHSA-2022:1435
RHSA-2022:1436 https://access.redhat.com/errata/RHSA-2022:1436
RHSA-2022:1437 https://access.redhat.com/errata/RHSA-2022:1437
RHSA-2022:1438 https://access.redhat.com/errata/RHSA-2022:1438
RHSA-2022:1439 https://access.redhat.com/errata/RHSA-2022:1439
RHSA-2022:1440 https://access.redhat.com/errata/RHSA-2022:1440
RHSA-2022:1441 https://access.redhat.com/errata/RHSA-2022:1441
RHSA-2022:1442 https://access.redhat.com/errata/RHSA-2022:1442
RHSA-2022:1443 https://access.redhat.com/errata/RHSA-2022:1443
RHSA-2022:1444 https://access.redhat.com/errata/RHSA-2022:1444
RHSA-2022:1445 https://access.redhat.com/errata/RHSA-2022:1445
RHSA-2022:1487 https://access.redhat.com/errata/RHSA-2022:1487
RHSA-2022:1488 https://access.redhat.com/errata/RHSA-2022:1488
RHSA-2022:1489 https://access.redhat.com/errata/RHSA-2022:1489
RHSA-2022:1490 https://access.redhat.com/errata/RHSA-2022:1490
RHSA-2022:1491 https://access.redhat.com/errata/RHSA-2022:1491
RHSA-2022:1492 https://access.redhat.com/errata/RHSA-2022:1492
RHSA-2022:1728 https://access.redhat.com/errata/RHSA-2022:1728
RHSA-2022:1729 https://access.redhat.com/errata/RHSA-2022:1729
RHSA-2022:2137 https://access.redhat.com/errata/RHSA-2022:2137
RHSA-2022:4957 https://access.redhat.com/errata/RHSA-2022:4957
RHSA-2022:4959 https://access.redhat.com/errata/RHSA-2022:4959
RHSA-2022:5837 https://access.redhat.com/errata/RHSA-2022:5837
USN-5388-1 https://usn.ubuntu.com/5388-1/
USN-5388-2 https://usn.ubuntu.com/5388-2/
USN-5546-1 https://usn.ubuntu.com/5546-1/
USN-5546-2 https://usn.ubuntu.com/5546-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2022-21443
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2022-21443
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.oracle.com/security-alerts/cpuapr2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.20159
EPSS Score 0.00049
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.