Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-36111
HistoryNov 23, 2022 - 12:00 a.m.

CVE-2022-36111 immundb has insufficient verification of data authenticity

2022-11-2300:00:00
CWE-345
GitHub_M
www.cve.org
cve-2022-36111
immudb
data authenticity
verification
vulnerability
sdks
server
patched

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

48.9%

immudb is a database with built-in cryptographic proof and verification. In versions prior to 1.4.1, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value. This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability. This issue has been patched in version 1.4.1.

CNA Affected

[
  {
    "vendor": "codenotary",
    "product": "immudb",
    "versions": [
      {
        "version": "< 1.4.1",
        "status": "affected"
      }
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

48.9%

Related for CVELIST:CVE-2022-36111