Lucene search

K
cve[email protected]CVE-2022-24808
HistoryApr 16, 2024 - 8:15 p.m.

CVE-2022-24808

2024-04-1620:15:00
web.nvd.nist.gov
94
net-snmp
vulnerability
cve-2022-24808
null pointer
set request
snmpv3
credentials
snmpv1
snmpv2c
community string
ip address range

6.5 Medium

CVSS3

Attack Vector

Attack Complexity

Privileges Required

User Interaction

Scope

Confidentiality Impact

Integrity Impact

Availability Impact

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.5%

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

VendorProductVersionCPE
net\-snmpnet\-snmp*cpe:2.3:a:net\-snmp:net\-snmp:*:*:*:*:*:*:*:*

6.5 Medium

CVSS3

Attack Vector

Attack Complexity

Privileges Required

User Interaction

Scope

Confidentiality Impact

Integrity Impact

Availability Impact

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.5%