Lucene search

K
nvd[email protected]NVD:CVE-2022-31702
HistoryDec 14, 2022 - 7:15 p.m.

CVE-2022-31702

2022-12-1419:15:13
CWE-77
web.nvd.nist.gov
5
vrealize network insight
command injection
rest api
vulnerability
network access
authentication

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

44.7%

vRealize Network Insight (vRNI) contains a command injection vulnerability present in the vRNI REST API. A malicious actor with network access to the vRNI REST API can execute commands without authentication.

Affected configurations

Nvd
Node
vmwarevrealize_network_insightMatch6.2.0
OR
vmwarevrealize_network_insightMatch6.3.0
OR
vmwarevrealize_network_insightMatch6.4.0
OR
vmwarevrealize_network_insightMatch6.5.1
OR
vmwarevrealize_network_insightMatch6.6.0
OR
vmwarevrealize_network_insightMatch6.7.0
VendorProductVersionCPE
vmwarevrealize_network_insight6.2.0cpe:2.3:a:vmware:vrealize_network_insight:6.2.0:*:*:*:*:*:*:*
vmwarevrealize_network_insight6.3.0cpe:2.3:a:vmware:vrealize_network_insight:6.3.0:*:*:*:*:*:*:*
vmwarevrealize_network_insight6.4.0cpe:2.3:a:vmware:vrealize_network_insight:6.4.0:*:*:*:*:*:*:*
vmwarevrealize_network_insight6.5.1cpe:2.3:a:vmware:vrealize_network_insight:6.5.1:*:*:*:*:*:*:*
vmwarevrealize_network_insight6.6.0cpe:2.3:a:vmware:vrealize_network_insight:6.6.0:*:*:*:*:*:*:*
vmwarevrealize_network_insight6.7.0cpe:2.3:a:vmware:vrealize_network_insight:6.7.0:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

44.7%