Lucene search

K
cveGitHub_MCVE-2022-24805
HistoryApr 16, 2024 - 8:15 p.m.

CVE-2022-24805

2024-04-1620:15:07
CWE-120
GitHub_M
web.nvd.nist.gov
127
2
net-snmp
buffer overflow
index handling
snmpv3
snmpv1
snmpv2c
patch
credentials
ip address range

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

6.6

Confidence

Low

EPSS

0

Percentile

13.0%

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

Affected configurations

Vulners
Vulnrichment
Node
net-snmpnet_snmpRange<5.9.2
VendorProductVersionCPE
net-snmpnet_snmp*cpe:2.3:a:net-snmp:net_snmp:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "net-snmp",
    "repo": "https://github.com/net-snmp/net-snmp",
    "vendor": "net-snmp",
    "versions": [
      {
        "lessThan": "5.9.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

Social References

More

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

6.6

Confidence

Low

EPSS

0

Percentile

13.0%