Search for vulnerabilities
Vulnerability details: VCID-p1zd-pypu-aaam
Vulnerability ID VCID-p1zd-pypu-aaam
Aliases CVE-2022-21716
GHSA-rv6r-3f5q-9rgx
PYSEC-2022-160
Summary Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 < /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2022:0982
rhas Important https://access.redhat.com/errata/RHSA-2022:0992
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21716.json
epss 0.00465 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00471 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00471 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00471 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00505 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00505 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00505 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00505 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00505 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00505 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00505 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00505 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00505 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00505 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00505 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00668 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00785 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00852 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.00875 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
epss 0.03718 https://api.first.org/data/v1/epss?cve=CVE-2022-21716
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=2060960
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-rv6r-3f5q-9rgx
cvssv3.1 7.5 https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2022-160.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2022-160.yaml
cvssv3.1 6.1 https://github.com/twisted/twisted
cvssv3.1 7.5 https://github.com/twisted/twisted
generic_textual HIGH https://github.com/twisted/twisted
generic_textual MODERATE https://github.com/twisted/twisted
cvssv3.1 7.5 https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9
generic_textual HIGH https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9
ssvc Track https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9
cvssv3.1 7.5 https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1
generic_textual HIGH https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1
cvssv3.1 7.5 https://github.com/twisted/twisted/releases/tag/twisted-22.2.0
generic_textual HIGH https://github.com/twisted/twisted/releases/tag/twisted-22.2.0
ssvc Track https://github.com/twisted/twisted/releases/tag/twisted-22.2.0
cvssv3.1 7.5 https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx
cvssv3.1_qr HIGH https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx
generic_textual HIGH https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx
ssvc Track https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx
cvssv3.1 7.5 https://lists.debian.org/debian-lts-announce/2022/03/msg00009.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2022/03/msg00009.html
ssvc Track https://lists.debian.org/debian-lts-announce/2022/03/msg00009.html
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K/
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6/
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
cvssv3.1 8.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
cvssv3.1 8.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2022-21716
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-21716
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-21716
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2022-21716
archlinux Medium https://security.archlinux.org/AVG-2663
cvssv3.1 5.4 https://security.gentoo.org/glsa/202301-02
cvssv3.1 7.5 https://security.gentoo.org/glsa/202301-02
generic_textual HIGH https://security.gentoo.org/glsa/202301-02
generic_textual MODERATE https://security.gentoo.org/glsa/202301-02
ssvc Track https://security.gentoo.org/glsa/202301-02
cvssv3.1 7.5 https://twistedmatrix.com/trac/ticket/10284
generic_textual HIGH https://twistedmatrix.com/trac/ticket/10284
ssvc Track https://twistedmatrix.com/trac/ticket/10284
cvssv3.1 5.3 https://www.oracle.com/security-alerts/cpuapr2022.html
cvssv3.1 7.5 https://www.oracle.com/security-alerts/cpuapr2022.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpuapr2022.html
generic_textual MODERATE https://www.oracle.com/security-alerts/cpuapr2022.html
ssvc Track https://www.oracle.com/security-alerts/cpuapr2022.html
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21716.json
https://api.first.org/data/v1/epss?cve=CVE-2022-21716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21716
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2022-160.yaml
https://github.com/twisted/twisted
https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9
https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1
https://github.com/twisted/twisted/releases/tag/twisted-22.2.0
https://lists.debian.org/debian-lts-announce/2022/03/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6/
https://security.gentoo.org/glsa/202301-02
https://twistedmatrix.com/trac/ticket/10284
https://www.oracle.com/security-alerts/cpuapr2022.html
2060960 https://bugzilla.redhat.com/show_bug.cgi?id=2060960
AVG-2663 https://security.archlinux.org/AVG-2663
cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
cpe:2.3:a:twistedmatrix:twisted:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:twistedmatrix:twisted:*:*:*:*:*:*:*:*
cpe:2.3:a:twisted:twisted:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:twisted:twisted:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
CVE-2022-21716 https://nvd.nist.gov/vuln/detail/CVE-2022-21716
GHSA-rv6r-3f5q-9rgx https://github.com/advisories/GHSA-rv6r-3f5q-9rgx
GHSA-rv6r-3f5q-9rgx https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx
RHSA-2022:0982 https://access.redhat.com/errata/RHSA-2022:0982
RHSA-2022:0992 https://access.redhat.com/errata/RHSA-2022:0992
USN-5354-1 https://usn.ubuntu.com/5354-1/
USN-5354-2 https://usn.ubuntu.com/5354-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21716.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/twisted/PYSEC-2022-160.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/twisted/twisted
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/twisted/twisted
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:42:00Z/ Found at https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/twisted/twisted/releases/tag/twisted-22.2.0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:42:00Z/ Found at https://github.com/twisted/twisted/releases/tag/twisted-22.2.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:42:00Z/ Found at https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.debian.org/debian-lts-announce/2022/03/msg00009.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:42:00Z/ Found at https://lists.debian.org/debian-lts-announce/2022/03/msg00009.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:42:00Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:42:00Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7U6KYDTOLPICAVSR34G2WRYLFBD2YW5K
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLKHA6WREIVAMBQD7KKWYHPHGGNKMAG6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2022-21716
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-21716
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-21716
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Found at https://security.gentoo.org/glsa/202301-02
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.gentoo.org/glsa/202301-02
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:42:00Z/ Found at https://security.gentoo.org/glsa/202301-02
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://twistedmatrix.com/trac/ticket/10284
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:42:00Z/ Found at https://twistedmatrix.com/trac/ticket/10284
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.oracle.com/security-alerts/cpuapr2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.oracle.com/security-alerts/cpuapr2022.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:42:00Z/ Found at https://www.oracle.com/security-alerts/cpuapr2022.html
Exploit Prediction Scoring System (EPSS)
Percentile 0.75953
EPSS Score 0.00465
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.