Vulnerability Details : CVE-2022-2132
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
Vulnerability category: Denial of service
Products affected by CVE-2022-2132
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:enterprise_linux_fast_datapath:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:enterprise_linux_fast_datapath:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
- cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*
- cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*
- cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*
Threat overview for CVE-2022-2132
Top countries where our scanners detected CVE-2022-2132
Top open port discovered on systems with this issue
53
IPs affected by CVE-2022-2132 571,191
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2022-2132!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2022-2132
0.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-2132
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
3.9
|
4.0
|
NIST |
CWE ids for CVE-2022-2132
-
The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are explicitly allowed by policy because the inputs are assumed to be safe, but the list is too permissive - that is, it allows an input that is unsafe, leading to resultant weaknesses.Assigned by: secalert@redhat.com (Secondary)
-
The product constructs the name of a file or other resource using input from an upstream component, but it does not restrict or incorrectly restricts the resulting name.Assigned by: secalert@redhat.com (Secondary)
-
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.Assigned by: secalert@redhat.com (Secondary)
-
The product receives data from an upstream component, but does not completely filter special elements before sending it to a downstream component.Assigned by: secalert@redhat.com (Secondary)
References for CVE-2022-2132
-
https://bugzilla.redhat.com/show_bug.cgi?id=2099475
2099475 – (CVE-2022-2132) CVE-2022-2132 dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufsExploit;Issue Tracking;Third Party Advisory
-
https://bugs.dpdk.org/show_bug.cgi?id=1031
1031 – CVE-2022-2132Exploit;Issue Tracking;Patch;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2022/09/msg00000.html
[SECURITY] [DLA 3092-1] dpdk security updateMailing List;Third Party Advisory
Jump to