Search for vulnerabilities
Vulnerability details: VCID-rcux-u2gs-muaj
Vulnerability ID VCID-rcux-u2gs-muaj
Aliases CVE-2022-43552
Summary A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
Status Published
Exploitability 0.5
Weighted Severity 5.3
Risk 2.6
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 5.9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json
epss 0.00085 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00085 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00085 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00102 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
epss 0.00105 https://api.first.org/data/v1/epss?cve=CVE-2022-43552
cvssv3.1 Low https://curl.se/docs/CVE-2022-43552.html
cvssv3.1 5.9 http://seclists.org/fulldisclosure/2023/Mar/17
ssvc Track http://seclists.org/fulldisclosure/2023/Mar/17
cvssv3.1 5.6 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.9 https://hackerone.com/reports/1764858
ssvc Track https://hackerone.com/reports/1764858
cvssv3.1 5.9 https://nvd.nist.gov/vuln/detail/CVE-2022-43552
cvssv3.1 5.9 https://security.gentoo.org/glsa/202310-12
ssvc Track https://security.gentoo.org/glsa/202310-12
cvssv3.1 5.9 https://security.netapp.com/advisory/ntap-20230214-0002/
ssvc Track https://security.netapp.com/advisory/ntap-20230214-0002/
cvssv3.1 5.9 https://support.apple.com/kb/HT213670
ssvc Track https://support.apple.com/kb/HT213670
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json
https://api.first.org/data/v1/epss?cve=CVE-2022-43552
https://curl.se/docs/CVE-2022-43552.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://hackerone.com/reports/1764858
1026830 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830
17 http://seclists.org/fulldisclosure/2023/Mar/17
202310-12 https://security.gentoo.org/glsa/202310-12
2152652 https://bugzilla.redhat.com/show_bug.cgi?id=2152652
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
CVE-2022-43552 https://nvd.nist.gov/vuln/detail/CVE-2022-43552
HT213670 https://support.apple.com/kb/HT213670
ntap-20230214-0002 https://security.netapp.com/advisory/ntap-20230214-0002/
RHSA-2023:2478 https://access.redhat.com/errata/RHSA-2023:2478
RHSA-2023:2963 https://access.redhat.com/errata/RHSA-2023:2963
RHSA-2023:3354 https://access.redhat.com/errata/RHSA-2023:3354
RHSA-2023:3355 https://access.redhat.com/errata/RHSA-2023:3355
RHSA-2023:7743 https://access.redhat.com/errata/RHSA-2023:7743
RHSA-2024:0428 https://access.redhat.com/errata/RHSA-2024:0428
USN-5788-1 https://usn.ubuntu.com/5788-1/
USN-5894-1 https://usn.ubuntu.com/5894-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://seclists.org/fulldisclosure/2023/Mar/17
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/ Found at http://seclists.org/fulldisclosure/2023/Mar/17
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://hackerone.com/reports/1764858
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/ Found at https://hackerone.com/reports/1764858
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-43552
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.gentoo.org/glsa/202310-12
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/ Found at https://security.gentoo.org/glsa/202310-12
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.netapp.com/advisory/ntap-20230214-0002/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/ Found at https://security.netapp.com/advisory/ntap-20230214-0002/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://support.apple.com/kb/HT213670
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/ Found at https://support.apple.com/kb/HT213670
Exploit Prediction Scoring System (EPSS)
Percentile 0.25685
EPSS Score 0.00085
Published At Aug. 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:30:59.449142+00:00 Alpine Linux Importer Import https://secdb.alpinelinux.org/edge/main.json 37.0.0