CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
AI Score
Confidence
Low
EPSS
Percentile
84.5%
If the Node.js https API was used incorrectly and âundefinedâ was in passed for the ârejectUnauthorizedâ parameter, no error was returned and connections to servers with an expired certificate would have been accepted.
[
{
"vendor": "n/a",
"product": "https://github.com/nodejs/node",
"versions": [
{
"version": "Fixed version 16.6.2, 14.17.5, and 12.22.5",
"status": "affected"
}
]
}
]
cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
hackerone.com/reports/1278254
lists.debian.org/debian-lts-announce/2022/10/msg00006.html
nodejs.org/en/blog/vulnerability/aug-2021-security-releases/
security.gentoo.org/glsa/202401-02
security.netapp.com/advisory/ntap-20210917-0003/
www.oracle.com/security-alerts/cpujan2022.html
www.oracle.com/security-alerts/cpujul2022.html
www.oracle.com/security-alerts/cpuoct2021.html
More
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
AI Score
Confidence
Low
EPSS
Percentile
84.5%