Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-1955

Опубликовано: 30 июн. 2022
Источник: redhat
CVSS3: 0
EPSS Низкий

Описание

Session 1.13.0 allows an attacker with physical access to the victim's device to bypass the application's password/pin lock to access user data. This is possible due to lack of adequate security controls to prevent dynamic code manipulation.

Отчет

The CVE-2022-1955 is not related to perl-snmp-session. It is something related to oxen-io/session-android package which does not shipped in RHEL and not even Fedora.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6perl-SNMP_SessionNot affected
Red Hat Enterprise Linux 7perl-SNMP_SessionNot affected
Red Hat Enterprise Linux 8perl-SNMP_SessionNot affected
Red Hat Enterprise Linux 9perl-SNMP_SessionNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=2106292perl-SNMP_Session: lack of adequate security controls may lead to information disclosure

EPSS

Процентиль: 24%
0.0008
Низкий

0 Low

CVSS3

Связанные уязвимости

CVSS3: 4.6
nvd
больше 3 лет назад

Session 1.13.0 allows an attacker with physical access to the victim's device to bypass the application's password/pin lock to access user data. This is possible due to lack of adequate security controls to prevent dynamic code manipulation.

CVSS3: 4.6
github
больше 3 лет назад

Session 1.13.0 allows an attacker with physical access to the victim's device to bypass the application's password/pin lock to access user data. This is possible due to lack of adequate security controls to prevent dynamic code manipulation.

EPSS

Процентиль: 24%
0.0008
Низкий

0 Low

CVSS3