7.3 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L
7.3 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.6%
setuid() does not affect libuv’s internal io_uring operations if
initialized before the call to setuid(). This allows the process to perform
privileged operations despite presumably having dropped such privileges
through a call to setuid(). This vulnerability affects all users using
version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js
21.
launchpad.net/bugs/cve/CVE-2024-22017
nodejs.org/en/blog/vulnerability/february-2024-security-releases/#setuid-does-not-drop-all-privileges-due-to-io_uring-cve-2024-22017---high
nvd.nist.gov/vuln/detail/CVE-2024-22017
security-tracker.debian.org/tracker/CVE-2024-22017
www.cve.org/CVERecord?id=CVE-2024-22017
7.3 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L
7.3 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
15.6%