Lucene search

K
githubGitHub Advisory DatabaseGHSA-P9WX-V264-Q34P
HistoryMay 14, 2022 - 3:00 a.m.

Improper Certificate Validation in Microsoft .NET Framework components

2022-05-1403:00:10
CWE-295
GitHub Advisory Database
github.com
15
microsoft
security feature bypass
certificate validation
.net framework 4.7.2
.net framework 3.0
asp.net core 1.1
.net core 2.0

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

59.3%

A security feature bypass vulnerability exists when Microsoft .NET Framework components do not correctly validate certificates, aka “.NET Framework Security Feature Bypass Vulnerability.” This affects .NET Framework 4.7.2, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2, ASP.NET Core 1.1, Microsoft .NET Framework 4.5.2, ASP.NET Core 2.0, ASP.NET Core 1.0, .NET Core 1.1, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, .NET Core 1.0, .NET Core 2.0, Microsoft .NET Framework 4.6, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.1/4.7.2, Microsoft .NET Framework 4.7.2.

Affected configurations

Vulners
Node
system.servicemodel.securityRange4.0.0–4.0.2
OR
system.servicemodel.duplexRange4.0.0–4.0.2
OR
system.servicemodel.securityRange4.5.0–4.5.3
OR
system.servicemodel.securityRange4.4.0–4.4.4
OR
system.servicemodel.securityRange4.3.0–4.3.3
OR
system.servicemodel.primitivesRange4.0.0–4.1.3
OR
system.servicemodel.primitivesRange4.5.0–4.5.3
OR
system.servicemodel.primitivesRange4.4.0–4.4.4
OR
system.servicemodel.primitivesRange4.3.0–4.3.3
OR
system.servicemodel.nettcpRange4.0.0–4.1.3
OR
system.servicemodel.nettcpRange4.5.0–4.5.3
OR
system.servicemodel.nettcpRange4.4.0–4.4.4
OR
system.servicemodel.nettcpRange4.3.0–4.3.3
OR
system.servicemodel.httpRange4.0.0–4.1.3
OR
system.servicemodel.httpRange4.5.0–4.5.3
OR
system.servicemodel.httpRange4.4.0–4.4.4
OR
system.servicemodel.httpRange4.3.0–4.3.3
OR
system.servicemodel.duplexRange4.5.0–4.5.3
OR
system.servicemodel.duplexRange4.4.0–4.4.4
OR
system.servicemodel.duplexRange4.3.0–4.3.3
OR
system.private.servicemodelRange4.5.0–4.5.3
OR
system.private.servicemodelRange4.4.0–4.4.4
OR
system.private.servicemodelRange4.3.0–4.3.3
OR
system.private.servicemodelRange4.0.0–4.1.3
VendorProductVersionCPE
*system.servicemodel.security*cpe:2.3:a:*:system.servicemodel.security:*:*:*:*:*:*:*:*
*system.servicemodel.duplex*cpe:2.3:a:*:system.servicemodel.duplex:*:*:*:*:*:*:*:*
*system.servicemodel.primitives*cpe:2.3:a:*:system.servicemodel.primitives:*:*:*:*:*:*:*:*
*system.servicemodel.nettcp*cpe:2.3:a:*:system.servicemodel.nettcp:*:*:*:*:*:*:*:*
*system.servicemodel.http*cpe:2.3:a:*:system.servicemodel.http:*:*:*:*:*:*:*:*
*system.private.servicemodel*cpe:2.3:a:*:system.private.servicemodel:*:*:*:*:*:*:*:*

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

59.3%