7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
kicad is vulnerable to remote code execution. The vulnerability exists in the Gerber Viewer gerber
and excellon ReadIJCoord
coordinate parsing functionality of KiCad EDA which allows an attacker to exploit the vulnerability by sending a specially-crafted gerber or excellon file.
lists.debian.org/debian-lts-announce/2022/05/msg00009.html
lists.debian.org/debian-lts-announce/2022/08/msg00010.html
lists.fedoraproject.org/archives/list/[email protected]/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/
security-tracker.debian.org/tracker/CVE-2022-23804
talosintelligence.com/vulnerability_reports/TALOS-2022-1453
www.debian.org/security/2022/dsa-5214
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P