CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
90.8%
The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | tomcat | * | cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* |
apache | tomcat | 10.1.0 | cpe:2.3:a:apache:tomcat:10.1.0:milestone1:*:*:*:*:*:* |
apache | tomcat | 10.1.0 | cpe:2.3:a:apache:tomcat:10.1.0:milestone10:*:*:*:*:*:* |
apache | tomcat | 10.1.0 | cpe:2.3:a:apache:tomcat:10.1.0:milestone11:*:*:*:*:*:* |
apache | tomcat | 10.1.0 | cpe:2.3:a:apache:tomcat:10.1.0:milestone12:*:*:*:*:*:* |
apache | tomcat | 10.1.0 | cpe:2.3:a:apache:tomcat:10.1.0:milestone13:*:*:*:*:*:* |
apache | tomcat | 10.1.0 | cpe:2.3:a:apache:tomcat:10.1.0:milestone14:*:*:*:*:*:* |
apache | tomcat | 10.1.0 | cpe:2.3:a:apache:tomcat:10.1.0:milestone2:*:*:*:*:*:* |
apache | tomcat | 10.1.0 | cpe:2.3:a:apache:tomcat:10.1.0:milestone3:*:*:*:*:*:* |
apache | tomcat | 10.1.0 | cpe:2.3:a:apache:tomcat:10.1.0:milestone4:*:*:*:*:*:* |
[
{
"vendor": "Apache Software Foundation",
"product": "Apache Tomcat",
"versions": [
{
"version": "Apache Tomcat 10.1 10.1.0-M1 to 10.1.0-M14",
"status": "affected"
},
{
"version": "Apache Tomcat 10 10.0.0-M1 to 10.0.20",
"status": "affected"
},
{
"version": "Apache Tomcat 9 9.0.13 to 9.0.62",
"status": "affected"
},
{
"version": "Apache Tomcat 8.5 8.5.38 to 8.5.78 ",
"status": "affected"
}
]
}
]
packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html
lists.apache.org/thread/2b4qmhbcyqvc7dyfpjyx54c03x65vhcv
lists.debian.org/debian-lts-announce/2022/10/msg00029.html
security.netapp.com/advisory/ntap-20220629-0002/
www.debian.org/security/2022/dsa-5265
www.oracle.com/security-alerts/cpujul2022.html
More
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
90.8%