Search for vulnerabilities
Vulnerability details: VCID-qb57-mgen-aaab
Vulnerability ID VCID-qb57-mgen-aaab
Aliases CVE-2022-1996
GHSA-r48q-9g5r-8q2h
Summary CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2022:6040
rhas Important https://access.redhat.com/errata/RHSA-2022:6042
cvssv3 9.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1996.json
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00308 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00340 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00340 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00340 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00621 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00642 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00684 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00857 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00857 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00857 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00857 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00857 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00914 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00914 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00914 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.00914 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
epss 0.01824 https://api.first.org/data/v1/epss?cve=CVE-2022-1996
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=2094982
cvssv3.1 9.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 9.1 https://github.com/emicklei/go-restful
generic_textual CRITICAL https://github.com/emicklei/go-restful
cvssv3.1 9.1 https://github.com/emicklei/go-restful/commit/926662532deb450272956c7bc573978464aae74e
generic_textual CRITICAL https://github.com/emicklei/go-restful/commit/926662532deb450272956c7bc573978464aae74e
cvssv3.1 9.1 https://github.com/emicklei/go-restful/commit/f292efff46ae17e9d104f865a60a39a2ae9402f1
generic_textual CRITICAL https://github.com/emicklei/go-restful/commit/f292efff46ae17e9d104f865a60a39a2ae9402f1
cvssv3.1 9.1 https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10
generic_textual CRITICAL https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10
cvssv3.1 9.1 https://github.com/emicklei/go-restful/issues/489
generic_textual CRITICAL https://github.com/emicklei/go-restful/issues/489
cvssv3.1 9.1 https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1
generic_textual CRITICAL https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1
cvssv3.1 9.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/575BLJ3Y2EQBRNTFR2OSQQ6L2W6UCST3
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/575BLJ3Y2EQBRNTFR2OSQQ6L2W6UCST3
cvssv3.1 9.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBDD3Q23RCGAGHIXUCWBU6N3S4RNAKXB
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBDD3Q23RCGAGHIXUCWBU6N3S4RNAKXB
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6
cvssv3.1 9.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SO5QC2JFW2PXBWAE27OYYYL5SPFUBHTY
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SO5QC2JFW2PXBWAE27OYYYL5SPFUBHTY
cvssv3.1 9.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W56PP46JVZEKCANBKXFKRVSBBRRMCY6V
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W56PP46JVZEKCANBKXFKRVSBBRRMCY6V
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5
cvssv3.1 9.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGQKWD6SE75PFBPFVSZYAKAVXKBZXKWS
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGQKWD6SE75PFBPFVSZYAKAVXKBZXKWS
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR
cvssv2 6.4 https://nvd.nist.gov/vuln/detail/CVE-2022-1996
cvssv3 9.1 https://nvd.nist.gov/vuln/detail/CVE-2022-1996
cvssv3.1 9.1 https://nvd.nist.gov/vuln/detail/CVE-2022-1996
cvssv3.1 9.1 https://pkg.go.dev/vuln/GO-2022-0619
generic_textual CRITICAL https://pkg.go.dev/vuln/GO-2022-0619
cvssv3.1 9.1 https://security.netapp.com/advisory/ntap-20220923-0005
generic_textual CRITICAL https://security.netapp.com/advisory/ntap-20220923-0005
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1996.json
https://api.first.org/data/v1/epss?cve=CVE-2022-1996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1996
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/emicklei/go-restful
https://github.com/emicklei/go-restful/commit/926662532deb450272956c7bc573978464aae74e
https://github.com/emicklei/go-restful/commit/f292efff46ae17e9d104f865a60a39a2ae9402f1
https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10
https://github.com/emicklei/go-restful/issues/489
https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/575BLJ3Y2EQBRNTFR2OSQQ6L2W6UCST3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OBDD3Q23RCGAGHIXUCWBU6N3S4RNAKXB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SO5QC2JFW2PXBWAE27OYYYL5SPFUBHTY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W56PP46JVZEKCANBKXFKRVSBBRRMCY6V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGQKWD6SE75PFBPFVSZYAKAVXKBZXKWS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/575BLJ3Y2EQBRNTFR2OSQQ6L2W6UCST3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/575BLJ3Y2EQBRNTFR2OSQQ6L2W6UCST3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBDD3Q23RCGAGHIXUCWBU6N3S4RNAKXB
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBDD3Q23RCGAGHIXUCWBU6N3S4RNAKXB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SO5QC2JFW2PXBWAE27OYYYL5SPFUBHTY
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SO5QC2JFW2PXBWAE27OYYYL5SPFUBHTY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W56PP46JVZEKCANBKXFKRVSBBRRMCY6V
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W56PP46JVZEKCANBKXFKRVSBBRRMCY6V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGQKWD6SE75PFBPFVSZYAKAVXKBZXKWS
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGQKWD6SE75PFBPFVSZYAKAVXKBZXKWS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/
https://pkg.go.dev/vuln/GO-2022-0619
https://security.netapp.com/advisory/ntap-20220923-0005
https://security.netapp.com/advisory/ntap-20220923-0005/
1012763 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012763
2094982 https://bugzilla.redhat.com/show_bug.cgi?id=2094982
cpe:2.3:a:go-restful_project:go-restful:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:go-restful_project:go-restful:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
CVE-2022-1996 https://nvd.nist.gov/vuln/detail/CVE-2022-1996
RHSA-2022:6040 https://access.redhat.com/errata/RHSA-2022:6040
RHSA-2022:6042 https://access.redhat.com/errata/RHSA-2022:6042
RHSA-2022:6351 https://access.redhat.com/errata/RHSA-2022:6351
RHSA-2022:8609 https://access.redhat.com/errata/RHSA-2022:8609
RHSA-2023:0814 https://access.redhat.com/errata/RHSA-2023:0814
RHSA-2023:3229 https://access.redhat.com/errata/RHSA-2023:3229
RHSA-2023:3557 https://access.redhat.com/errata/RHSA-2023:3557
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1996.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/emicklei/go-restful
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/emicklei/go-restful/commit/926662532deb450272956c7bc573978464aae74e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/emicklei/go-restful/commit/f292efff46ae17e9d104f865a60a39a2ae9402f1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://github.com/emicklei/go-restful/issues/489
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/575BLJ3Y2EQBRNTFR2OSQQ6L2W6UCST3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBDD3Q23RCGAGHIXUCWBU6N3S4RNAKXB
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SO5QC2JFW2PXBWAE27OYYYL5SPFUBHTY
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W56PP46JVZEKCANBKXFKRVSBBRRMCY6V
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGQKWD6SE75PFBPFVSZYAKAVXKBZXKWS
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-1996
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-1996
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-1996
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://pkg.go.dev/vuln/GO-2022-0619
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://security.netapp.com/advisory/ntap-20220923-0005
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.70468
EPSS Score 0.00308
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.