Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-36110
HistorySep 09, 2022 - 7:15 p.m.

CVE-2022-36110 Netmaker vulnerable to Insufficient Granularity of Access Control

2022-09-0919:15:12
CWE-285
CWE-1220
GitHub_M
www.cve.org
2
netmaker
wireguard
insufficient granularity
access control
cve-2022-36110

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.001

Percentile

42.8%

Netmaker makes networks with WireGuard. Prior to version 0.15.1, Improper Authorization functions lead to non-privileged users running privileged API calls. If someone adds users to the Netmaker platform who do not have admin privileges, they can use their auth tokens to run admin-level functions via the API. This problem has been patched in v0.15.1.

CNA Affected

[
  {
    "product": "netmaker",
    "vendor": "gravitl",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.15.1"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.001

Percentile

42.8%

Related for CVELIST:CVE-2022-36110