// For flags

CVE-2022-2781

 

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In affected versions of Octopus Server it was identified that the same encryption process was used for both encrypting session cookies and variables.

En versiones afectadas de Octopus Server se ha identificado que era usado el mismo proceso de cifrado tanto para cifrar las cookies de sesiĆ³n como las variables

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-08-11 CVE Reserved
  • 2022-10-06 CVE Published
  • 2024-04-28 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Octopus
Search vendor "Octopus"
Octopus Server
Search vendor "Octopus" for product "Octopus Server"
>= 3.2.10 < 2022.1.3154
Search vendor "Octopus" for product "Octopus Server" and version " >= 3.2.10 < 2022.1.3154"
-
Affected
Octopus
Search vendor "Octopus"
Octopus Server
Search vendor "Octopus" for product "Octopus Server"
>= 2022.2.6729 < 2022.2.7897
Search vendor "Octopus" for product "Octopus Server" and version " >= 2022.2.6729 < 2022.2.7897"
-
Affected
Octopus
Search vendor "Octopus"
Octopus Server
Search vendor "Octopus" for product "Octopus Server"
>= 2022.3.348 < 2022.3.10586
Search vendor "Octopus" for product "Octopus Server" and version " >= 2022.3.348 < 2022.3.10586"
-
Affected