// For flags

CVE-2022-22333

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

IBM Sterling Secure Proxy 6.0.3.0, 6.0.2.0, and 3.4.3.2 and IBM Sterling External Authentication Server are vulnerable a buffer overflow, due to the Jetty based GUI in the Secure Zone not properly validating the sizes of the form content and/or HTTP headers submitted. A local attacker positioned inside the Secure Zone could submit a specially crafted HTTP request to disrupt service. IBM X-Force ID: 219133.

IBM Sterling Secure Proxy 6.0.3.0, 6.0.2.0, y 3.4.3.2 e IBM Sterling External Authentication Server son vulnerables a un desbordamiento de búfer, debido a que la interfaz gráfica de usuario basada en Jetty en la Secure Zone no valida correctamente los tamaños del contenido del formulario y/o las cabeceras HTTP enviadas. Un atacante local situado dentro de la Zona Segura podría enviar una solicitud HTTP especialmente diseñada para interrumpir el servicio. ID de IBM X-Force: 219133

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-01-03 CVE Reserved
  • 2022-02-23 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ibm
Search vendor "Ibm"
Sterling External Authentication Server
Search vendor "Ibm" for product "Sterling External Authentication Server"
3.4.3.2
Search vendor "Ibm" for product "Sterling External Authentication Server" and version "3.4.3.2"
-
Affected
Ibm
Search vendor "Ibm"
Sterling External Authentication Server
Search vendor "Ibm" for product "Sterling External Authentication Server"
6.0.2.0
Search vendor "Ibm" for product "Sterling External Authentication Server" and version "6.0.2.0"
-
Affected
Ibm
Search vendor "Ibm"
Sterling External Authentication Server
Search vendor "Ibm" for product "Sterling External Authentication Server"
6.0.3.0
Search vendor "Ibm" for product "Sterling External Authentication Server" and version "6.0.3.0"
-
Affected
Ibm
Search vendor "Ibm"
Sterling Secure Proxy
Search vendor "Ibm" for product "Sterling Secure Proxy"
3.4.3.2
Search vendor "Ibm" for product "Sterling Secure Proxy" and version "3.4.3.2"
-
Affected
Ibm
Search vendor "Ibm"
Sterling Secure Proxy
Search vendor "Ibm" for product "Sterling Secure Proxy"
6.0.2
Search vendor "Ibm" for product "Sterling Secure Proxy" and version "6.0.2"
-
Affected
Ibm
Search vendor "Ibm"
Sterling Secure Proxy
Search vendor "Ibm" for product "Sterling Secure Proxy"
6.0.3.0
Search vendor "Ibm" for product "Sterling Secure Proxy" and version "6.0.3.0"
-
Affected