Vulnerability Details : CVE-2022-21676
Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package starting from version `4.0.0`, including those who uses depending packages like `socket.io`. Versions prior to `4.0.0` are not impacted. A fix has been released for each major branch, namely `4.1.2` for the `4.x.x` branch, `5.2.1` for the `5.x.x` branch, and `6.1.1` for the `6.x.x` branch. There is no known workaround except upgrading to a safe version.
Products affected by CVE-2022-21676
- cpe:2.3:a:socket:engine.io:*:*:*:*:*:node.js:*:*
- cpe:2.3:a:socket:engine.io:*:*:*:*:*:node.js:*:*
- cpe:2.3:a:socket:engine.io:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-21676
0.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-21676
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2022-21676
-
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.Assigned by:
- nvd@nist.gov (Secondary)
- security-advisories@github.com (Secondary)
-
The product does not handle or incorrectly handles an exceptional condition.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-21676
-
https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db
fix: properly handle invalid data sent by a malicious websocket client · socketio/engine.io@a70800d · GitHubPatch;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20220209-0002/
CVE-2022-21676 NPM Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://github.com/socketio/engine.io/releases/tag/4.1.2
Release 4.1.2 · socketio/engine.io · GitHubRelease Notes;Third Party Advisory
-
https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c
fix: properly handle invalid data sent by a malicious websocket client · socketio/engine.io@c0e194d · GitHubPatch;Third Party Advisory
-
https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab
fix: properly handle invalid data sent by a malicious websocket client · socketio/engine.io@66f889f · GitHubPatch;Third Party Advisory
-
https://github.com/socketio/engine.io/releases/tag/6.1.1
Release 6.1.1 · socketio/engine.io · GitHubRelease Notes;Third Party Advisory
-
https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f
Uncaught Exception in engine.io · Advisory · socketio/engine.io · GitHubThird Party Advisory
-
https://github.com/socketio/engine.io/releases/tag/5.2.1
Release 5.2.1 · socketio/engine.io · GitHubRelease Notes;Third Party Advisory
Jump to