// For flags

CVE-2022-47924

Arbitrary Code Execution using the validate function of csaf-validator-lib

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

An high privileged attacker may pass crafted arguments to the validate function of csaf-validator-lib of a locally installed Secvisogram in versions < 0.1.0 wich can result in arbitrary code execution and DoS once the users triggers the validation.

*Credits: Damian Pfammatter from Cyber-Defense Campus
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
Multiple
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2022-12-22 CVE Reserved
  • 2023-03-27 CVE Published
  • 2024-10-17 EPSS Updated
  • 2025-02-19 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
  • CAPEC-137: Parameter Injection
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Csaf-validator-lib Project
Search vendor "Csaf-validator-lib Project"
Csaf-validator-lib
Search vendor "Csaf-validator-lib Project" for product "Csaf-validator-lib"
< 0.1.0
Search vendor "Csaf-validator-lib Project" for product "Csaf-validator-lib" and version " < 0.1.0"
-
Affected