Lucene search

K
nvd[email protected]NVD:CVE-2022-31702
HistoryDec 14, 2022 - 7:15 p.m.

CVE-2022-31702

2022-12-1419:15:13
CWE-77
web.nvd.nist.gov
vrealize network insight
command injection
rest api
vulnerability
network access
authentication

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

48.9%

vRealize Network Insight (vRNI) contains a command injection vulnerability present in the vRNI REST API. A malicious actor with network access to the vRNI REST API can execute commands without authentication.

Affected configurations

NVD
Node
vmwarevrealize_network_insightMatch6.2.0
OR
vmwarevrealize_network_insightMatch6.3.0
OR
vmwarevrealize_network_insightMatch6.4.0
OR
vmwarevrealize_network_insightMatch6.5.1
OR
vmwarevrealize_network_insightMatch6.6.0
OR
vmwarevrealize_network_insightMatch6.7.0

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

48.9%