9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.6 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
64.9%
It was discovered that Erlang did not properly implement TLS client
certificate validation during the TLS handshake. A remote attacker could
use this issue to bypass client authentication.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.10 | noarch | erlang-ssl | < 1:24.3.4.1+dfsg-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | erlang | < 1:24.3.4.1+dfsg-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | erlang-asn1 | < 1:24.3.4.1+dfsg-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | erlang-asn1-dbgsym | < 1:24.3.4.1+dfsg-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | erlang-base | < 1:24.3.4.1+dfsg-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | erlang-base-dbgsym | < 1:24.3.4.1+dfsg-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | erlang-common-test | < 1:24.3.4.1+dfsg-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | erlang-common-test-dbgsym | < 1:24.3.4.1+dfsg-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | erlang-crypto | < 1:24.3.4.1+dfsg-1ubuntu0.1 | UNKNOWN |
Ubuntu | 22.10 | noarch | erlang-crypto-dbgsym | < 1:24.3.4.1+dfsg-1ubuntu0.1 | UNKNOWN |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.6 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
64.9%