Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-35821

Опубликовано: 09 авг. 2022
Источник: msrc
CVSS3: 4.4
EPSS Низкий

Описание

Azure Sphere Information Disclosure Vulnerability

FAQ

What version of Azure Sphere has the update that protects from this vulnerability?

All versions of Azure Sphere that are 22.07 and higher are protected from this vulnerability.

How do I ensure my Azure Sphere device has the update?

If your device is new or has not been connected to the internet for a while, connect the device to a secure, private local network with internet access and allow the device to automatically update itself. If the device is already online, verify that the operating system version 21.07 has been installed using the Azure Sphere CLI command:

azsphere device show-os-version

If the device is connected to the internet and does not yet have the latest update, check the update status with the following Azure Sphere CLI command:

azsphere device show-deployment-status

Azure Sphere is running on IoT devices in my environment. How do I know if any of those devices are affected by this vulnerability?

An IoT device that is running Azure Sphere and is connected to a network is automatically updated every day. This vulnerability has already been addressed so the devices are protected from this vulnerability. More information on Azure Sphere’s CVE principles can be found on https://docs.microsoft.com/en-us/azure-sphere/deployment/azure-sphere-cves

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?

This vulnerability could allow an attacker to disclose the contents of the memory location, but they cannot modify the contents or make the system unavailable.

According to the CVSS metric, the attack vector is local (AV:L). What does this mean for this vulnerability?

The attacker would have to be present on the system with root privileges to be able to exploit this vulnerability.

According to the CVSS metric, privileges required is high (PR:H). What privileges are required to exploit this vulnerability?

The attacker needs to have root privileges on the target system to be able to exploit this vulnerability.

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 83%
0.01963
Низкий

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.4
nvd
больше 3 лет назад

Azure Sphere Information Disclosure Vulnerability

CVSS3: 4.4
github
больше 3 лет назад

Azure Sphere Information Disclosure Vulnerability.

CVSS3: 4.4
fstec
больше 3 лет назад

Уязвимость операционной системы Azure Sphere, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к устройству

EPSS

Процентиль: 83%
0.01963
Низкий

4.4 Medium

CVSS3