// For flags

CVE-2022-22472

 

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

IBM Spectrum Protect Plus Container Backup and Restore (10.1.5 through 10.1.10.2 for Kubernetes and 10.1.7 through 10.1.10.2 for Red Hat OpenShift) could allow a remote attacker to bypass IBM Spectrum Protect Plus role based access control restrictions, caused by improper disclosure of session information. By retrieving the logs of a container an attacker could exploit this vulnerability to bypass login security of the IBM Spectrum Protect Plus server and gain unauthorized access based on the permissions of the IBM Spectrum Protect Plus user to the vulnerable Spectrum Protect Plus server software. IBM X-Force ID: 225340.

IBM Spectrum Protect Plus Container Backup and Restore (versiones 10.1.5 hasta 10.1.10.2 para Kubernetes y 10.1.7 hasta 10.1.10.2 para Red Hat OpenShift) podría permitir a un atacante remoto omitir las restricciones de control de acceso basadas en roles de IBM Spectrum Protect Plus, causado por la divulgación inapropiada de información de sesión. Al recuperar los registros de un contenedor, un atacante podría explotar esta vulnerabilidad para omitir la seguridad de inicio de sesión del servidor de IBM Spectrum Protect Plus y conseguir acceso no autorizado basado en los permisos del usuario de IBM Spectrum Protect Plus al software vulnerable del servidor de Spectrum Protect Plus. IBM X-Force ID: 225340

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-01-03 CVE Reserved
  • 2022-06-30 CVE Published
  • 2024-06-13 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-281: Improper Preservation of Permissions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ibm
Search vendor "Ibm"
Spectrum Protect Plus Container Backup And Restore
Search vendor "Ibm" for product "Spectrum Protect Plus Container Backup And Restore"
>= 10.1.5 < 10.1.11
Search vendor "Ibm" for product "Spectrum Protect Plus Container Backup And Restore" and version " >= 10.1.5 < 10.1.11"
kubernetes
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe
Ibm
Search vendor "Ibm"
Spectrum Protect Plus Container Backup And Restore
Search vendor "Ibm" for product "Spectrum Protect Plus Container Backup And Restore"
>= 10.1.7 < 10.1.11
Search vendor "Ibm" for product "Spectrum Protect Plus Container Backup And Restore" and version " >= 10.1.7 < 10.1.11"
openshift
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
--
Safe